Federal Information Security Management Act

Results: 1715



#Item
611Social media / Computer security / Facebook / Crime prevention / Security / Internet privacy / E-Government / Social networking service / Federal Information Security Management Act / World Wide Web / Computing / Technology

GAO Logo (Black_white-w_stroke)cover

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2011-07-28 14:14:50
612Privacy Act / Government / Security / Safety / Personal life / Personally identifiable information / Federal Aviation Administration

Federal Register / Vol. 67, No[removed]Monday, October 7, [removed]Notices Management Board is to foster a cooperative and constructive working relationship between employees, labor representatives, and managers within DOT

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2010-12-01 22:33:50
613Federal grants in the United States / Public economics / Homeland Security Appropriations Act / Emergency management / Economic policy / Public safety / Grants / Federal assistance in the United States / Public finance

Office of Fire Prevention and Control Information Bulletin 22 June 2006

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2007-01-07 20:20:00
614National security / Computing / Public safety / Data security / Computer law / Federal Information Security Management Act / Cloud computing / Information security / Graph Style Sheets / Computer security / Security / Crime prevention

Security Control Review of the CFPB’s Cloud Computing–Based General Support System

Add to Reading List

Source URL: oig.federalreserve.gov

Language: English - Date: 2014-07-29 13:19:59
615Computing / Computer network security / National security / Security controls / Federal Information Security Management Act / NIST Special Publication 800-53 / Information security / Privacy / Cloud computing / Computer security / Security / Data security

This DRAFT document has been approved as FINAL, and has been superseded by the following publication: Publication Number: Special Publication[removed]Revision 4

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-30 11:01:08
616Management / Disaster preparedness / National Response Framework / Federal Emergency Management Agency / National Response Plan / Hurricane Katrina / National Historic Preservation Act / Emergency management / Public safety / United States Department of Homeland Security

Examples of possible assistance offered by ESF #11 Protection of Natural and Cultural Resources and Historic Properties (NCH): „„Create and maintain Geographic Information

Add to Reading List

Source URL: www.doi.gov

Language: English - Date: 2011-10-27 15:21:37
617Cyberwarfare / Computer network security / Crime prevention / National security / Data security / Information security / Vulnerability / Emergency management / Federal Information Security Management Act / Computer security / Security / Public safety

INFORMATION SECURITY AND PRIVACY ADVISORY BOARD _____________________________ Established by the Computer Security Act of[removed]Amended by the Federal Information Security Management Act of[removed]The Honorable Karen Eva

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-12-14 00:00:00
618Security / FTC Fair Information Practice / Internet privacy / Personally identifiable information / Information security / Privacy Office of the U.S. Department of Homeland Security / Hugo Teufel III / Ethics / Privacy / Government

INFORMATION SECURITY AND PRIVACY ADVISORY BOARD _____________________________ Established by the Computer Security Act of[removed]Amended by the Federal Information Security Management Act of[removed]Toward A 21st Centur

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-05-27 01:00:00
619Cyberwarfare / Computing / Computer law / Federal Information Security Management Act / Risk analysis / Certification and Accreditation / Vivek Kundra / Cyber-security regulation / Asset / Computer security / Security / Data security

Z:ceLevinsonMAeral Cybersecurity Best Practice.ISCM.wpd

Add to Reading List

Source URL: www.thecre.com

Language: English - Date: 2013-04-20 07:39:35
620Espionage / Vulnerability / Insider / Counterintelligence / Threat / Information security / Federal Information Security Management Act / Industrial espionage / Computer security / Security / Cyberwarfare

Insider Threat Security Specialist Certificate

Add to Reading List

Source URL: insiderthreatdefense.com

Language: English - Date: 2014-07-13 14:32:22
UPDATE