Federal Information Security Management Act

Results: 1715



#Item
91Public safety / Application security / NIST Special Publication 800-53 / Information security / Trustworthy computing / Cloud computing / Threat model / Federal Information Security Management Act / Data center / Computer security / Computing / Security

Operational security for online services overview Microsoft Trustworthy Computing October 21, 2013

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-10-23 18:25:56
92Data privacy / Law / Computer law / Information security / Health Insurance Portability and Accountability Act / Federal Information Security Management Act / Chief information security officer / IT risk / Computer security / Security / Data security

Policy Number (A165) University-wide Policy Information Technology Security Incident Response Procedures Policy Date Approved:

Add to Reading List

Source URL: umshare.miami.edu

Language: English
93Public safety / Cyberwarfare / Computer law / Federal Information Security Management Act / United States Computer Emergency Readiness Team / Einstein / Managed Trusted Internet Protocol Service / National Cyber Security Division / International Cybercrime / United States Department of Homeland Security / Security / Computer security

fEDERAL iNFORMATION sECURITY MANAGEMENT ACT

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2015-02-27 17:46:21
94Federal Information Security Management Act / Continuous monitoring / Security / Information technology management / Computing / Computer security / Data security / Computer law

An Enterprise Continuous Monitoring Technical Reference ArchitecturePresenter: Peter Mell Senior Computer Scientist National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
95Federal Information Security Management Act / Information security / Vulnerability / Penetration test / Managed security service / Security risk / Application security / Security testing / Security controls / Computer security / Security / Cyberwarfare

Spotlight on Security A Modern Approach to Threat Protection, Detection, and Reactionwww.pcconnection.com

Add to Reading List

Source URL: info.pcconnection.com

Language: English - Date: 2015-04-14 09:10:28
96Information technology management / Public safety / Data security / Computer law / Information security / Federal Information Security Management Act / Change management / Incident management / Configuration management / Computer security / Security / Computing

Policy Number (A145) University-wide Policy Change and Incident Management Policy Date Approved:

Add to Reading List

Source URL: umshare.miami.edu

Language: English
97Public safety / National security / Crime prevention / Information security / Security controls / Physical security / Federal Information Security Management Act / Information technology audit / Information security management system / Security / Computer security / Data security

Policy Number (A155) University-wide Policy Information Security Policy Date Approved:

Add to Reading List

Source URL: umshare.miami.edu

Language: English
98Security / Software testing / Hacking / Vulnerability / SAINT / CVSS / Federal Information Security Management Act / Password / Information security / Computer security / Cyberwarfare / Computer network security

FISMA Vulnerabilities Assessment Report Report Generated: March 20, Background The E-Government Act (Public Lawpassed by the 107th Congress and signed into law by the President in December 2002 recogni

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2013-03-21 09:36:07
99Computing / Information security / Authorization / Password / Access control / Internet privacy / Superuser / Federal Information Security Management Act / Health Insurance Portability and Accountability Act / Computer security / Security / Public safety

Policy Number (A130) University-wide Policy Access Control and User Account Management Policy Date Approved:

Add to Reading List

Source URL: umshare.miami.edu

Language: English
100National security / Crime prevention / United States Department of Homeland Security / Computer law / Federal Information Security Management Act / Managed Trusted Internet Protocol Service / Einstein / Chief financial officer / Information security / Security / Public safety / Computer security

fEDERAL iNFORMATION sECURITY MANAGEMENT ACT

Add to Reading List

Source URL: autonomicresources.com

Language: English - Date: 2014-06-02 16:27:43
UPDATE