Federal Information Security Management Act

Results: 1715



#Item
191Office of Information and Regulatory Affairs / United States Department of Housing and Urban Development / Homelessness / Government / United States / Paperwork Reduction Act / Transportation Security Administration / Office of Management and Budget

[removed]Federal Register / Vol. 76, No[removed]Monday, November 14, [removed]Notices Information Collection Requirement Title: TSA Airspace Waiver.

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2013-05-23 10:57:06
192Hacking / National security / Computer network security / Crime prevention / Secure communication / Federal Information Security Management Act / Vulnerability / National Cyber Security Division / U.S. Department of Defense Strategy for Operating in Cyberspace / Security / Computer security / Cyberwarfare

Doctrine for Cybersecurity∗ Deirdre K. Mulligan† Fred B. Schneider‡ May 15, 2011

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-05-15 22:04:38
193Cyberwarfare / Information technology audit / Computer network security / Security controls / Information security / Federal Information Security Management Act / Audit / Vulnerability / Computer security / Data security / Security

Audit of Planned Physical and Environmental Controls for the Board’s Data Center Relocation

Add to Reading List

Source URL: oig.federalreserve.gov

Language: English - Date: 2015-02-04 09:05:44
194Tenable Network Security / Nessus / Information assurance vulnerability alert / Defense Information Systems Agency / Security Content Automation Protocol / Vulnerability management / Federal Information Security Management Act / Vulnerability scanner / Vulnerability / Computer security / Cyberwarfare / Computing

| CASE STUDY Tenable Delivers Best-of-Breed Configuration Compliance and Vulnerability Management for U.S. Department of Defense

Add to Reading List

Source URL: www.tenable.com

Language: English - Date: 2013-08-22 14:20:24
195Information technology management / Computing / System administration / LogLogic / Tibco Software / Federal Information Security Management Act / Regulatory compliance / Asset / Cloud computing / Data security / Computer security / Security

solution-brief-fisma-nist[removed]compliance

Add to Reading List

Source URL: www.tibco.com

Language: English - Date: 2015-01-19 09:03:43
196National Nuclear Security Administration / United States Department of Energy / Information security / Security management / Certification and Accreditation / Committee on National Security Systems / Risk management framework / Security risk / Federal Information Security Management Act / Computer security / Security / Public safety

NNSA Policy Letter NAP-14.1-D Approved: [removed]Baseline Cyber Security Program

Add to Reading List

Source URL: nnsa.energy.gov

Language: English - Date: 2013-08-21 10:47:19
197Computer security / Federal Information Security Management Act / Office of Management and Budget / Government / Management / Data.gov / Government procurement in the United States / Chief financial officer / Politics of the United States / United States administrative law / United States Office of Management and Budget / Computer law

PDF Document

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2015-02-12 11:03:28
198Security / Software testing / Hacking / Vulnerability / Social vulnerability / Vulnerability management / Federal Information Security Management Act / Computer security / Risk / Cyberwarfare

  Vulnerability  Assessment  Policy     Created by or for the SANS Institute. Feel free to modify or use for your organization. If you have a policy to contribute, please send e-mail to

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-10-09 13:45:21
199Computing / SCADA / Control system security / Industrial control system / Federal Information Security Management Act / Information security / Security controls / ICS / Risk management framework / Computer security / Technology / Security

(Second and Final) DRAFT Special Publication[removed]Revision 2, Guide to Industrial Control Systems (ICS) Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-09 09:58:03
200Security / Consensus audit guidelines / Vulnerability / Penetration test / Global Information Assurance Certification / Federal Information Security Management Act / Data loss prevention software / Security controls / Malware / Computer security / Cyberwarfare / Computer network security

Automating Crosswalk between SP 800 and the 20 Critical Controls 2

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:55
UPDATE