Federal Information Security Management Act

Results: 1715



#Item
161Electronic warfare / Hacking / Military technology / Computer security / Military science / International Multilateral Partnership Against Cyber Threats / Federal Information Security Management Act / Cyber-security regulation / National Cyber Security Division / Computer crimes / Cyberwarfare / Security

Microsoft Word - 120417_MultiIndustry_HouseCybersecurityLegislation_Boehner_Pelosi

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:26:55
162California Department of Toxic Substances Control / Federal Information Security Management Act / Project management / Information security management system / Computing / Law / Government / Computer security / Data security / Environment of California

DTSC FISMA Corrective Action Plan, December 2014

Add to Reading List

Source URL: www.dtsc.ca.gov

Language: English - Date: 2015-02-24 11:44:19
163Federal Information Security Management Act / International Space Station / United States Department of the Interior / Spaceflight / Computer security / Federal Desktop Core Configuration

U.S. Department of the Interior Office of the Chief Information Officer Interior - FDCC & SCAP January 24, 2008 Leland Dudek

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:55:06
164Federal Information Security Management Act / Security Technical Implementation Guide / Security Content Automation Protocol / Electronics / Law / National Vulnerability Database / Computer security / Computing / Federal Desktop Core Configuration

Federal Desktop Core Configuration (FDCC) FDCC Implementers Workshop January 24, 2008 NIST Computer Security Division

Add to Reading List

Source URL: nvd.nist.gov

Language: English
165Computing / National Cyber Security Division / Information security / Penetration test / Computer security / Security / Federal Information Security Management Act

Information System Security Line of Business Presented by: Michael C. Smith Department of Homeland

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:55:06
166Cyberwarfare / Crime prevention / National security / Information security / Security controls / Security risk / Vulnerability / Information security management system / Federal Information Security Management Act / Security / Computer security / Data security

Maintaining the Integrity and Confidentiality of Personal Information Audit summary Background The public sector is a complex business. In its normal, day-to-day activity it legitimately gathers and uses personal informa

Add to Reading List

Source URL: www.audit.vic.gov.au

Language: English - Date: 2013-07-11 19:57:49
167Public-key cryptography / Data security / Cryptography standards / Information security / FIPS 140-2 / Domain Name System Security Extensions / Federal Information Security Management Act / Key size / Public key infrastructure / Cryptography / Computer security / Key management

NIST SP[removed]Part 3 Rev. 1, Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-01-26 16:58:52
168Risk / Management / Risk management / NIST Special Publication 800-53 / Federal Information Security Management Act / Security Content Automation Protocol / Information security / Risk management framework / Security controls / Computer security / Security / Data security

ITL Bulletin, Release of NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations, (January 2015)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-28 12:07:10
169National security / Continuing resolution / Homeland Security Appropriations Act / Sensitive Security Information / Federal Protective Service / Federal Emergency Management Agency / Furlough / Homeland security / Federal Air Marshal Service / United States Department of Homeland Security / Government / Public safety

FY2014 Appropriations Lapse and the Department of Homeland Security: Impact and Legislation

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-06 13:16:20
170Computer network security / Software testing / Security / Risk / Rapid7 / Metasploit Project / Vulnerability / Federal Information Security Management Act / Risk management / Computer security / Software / Cyberwarfare

Rapid7® Nexpose® Ultimate is the only vulnerability management solution that prioritizes vulnerabilities, controls, and configurations across the modern network to make better risk management decisions, faster.

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-12-15 17:35:01
UPDATE