Federal Information Security Management Act

Results: 1715



#Item
61National security / Government / Data security / Crime prevention / Committee on National Security Systems / Information security / Information Security Oversight Office / Classified information / Federal Information Security Management Act / Security / Computer security / United States government secrecy

Committee on National Security Systems CNSS Policy No. 18 JuneNational Policy

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 15:09:48
62Law / Security / 107th United States Congress / E-Government Act / Section 508 Amendment to the Rehabilitation Act / Federal Information Security Management Act / Government procurement in the United States / Information security / Freedom of information legislation / Computer law / Government / Computer security

H. ROne Hundred Seventh Congress of the United States of America AT THE SECOND SESSION

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2012-12-21 08:04:01
63Federal Information Security Management Act / Asset / Chief information security officer / Threat / Inspector General / Consensus audit guidelines / Vulnerability / Computer security / Security / Cyberwarfare

Feeling Cyber “Insecure”? Showing Progress Towards the Consensus Audit Guidelines © 2008 Quest Software, Inc. ALL RIGHTS RESERVED.

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:21:20
64Cyberwarfare / Federal Information Security Management Act / Security controls / Information security / Vulnerability / Certification and Accreditation / Asset / Information technology audit / NIST Special Publication 800-53 / Computer security / Data security / Security

Microsoft Word - FISMA_Final.doc093008.doc

Add to Reading List

Source URL: oig.federalreserve.gov

Language: English - Date: 2015-01-21 10:06:35
65Public safety / Comprehensive National Cybersecurity Initiative / United States Department of Homeland Security / Federal Information Security Management Act / National Cyber Security Division / Supply chain cyber security / Cyberwarfare / Security / Computer security

Cybersecurity: Securing Public Networks, Readying the Nation Congress must act on legislation that incentivizes information sharing, promotes secure IT systems, and a skilled workforce to maintain them. DHS should contin

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2015-02-02 10:20:00
66Law / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / United States Department of Health and Human Services / Federal Information Security Management Act / Information security / Application security / Security controls / Computer security / Security / Data security

HHS Information Security Program

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-06 22:59:03
67Law / Clone Systems /  Inc. / Computer security / Computer law / Federal Information Security Management Act

Microsoft Word - Network.docx

Add to Reading List

Source URL: www.accesspointinc.com

Language: English - Date: 2014-08-15 13:46:02
68California Department of Toxic Substances Control / Federal Information Security Management Act / Project management / Information security management system / Computing / Law / Government / Computer security / Data security / Environment of California

PDF Document

Add to Reading List

Source URL: www.dtsc.ca.gov

Language: English - Date: 2015-02-24 11:44:19
69Open Vulnerability and Assessment Language / Vulnerability / Information assurance vulnerability alert / Critical infrastructure protection / Defense Information Systems Agency / Information assurance / Security Technical Implementation Guide / Information security / Federal Information Security Management Act / Computer security / Security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 14:03:27
70Computing / Computer law / Federal Information Security Management Act / Risk analysis / Information security / Asset / Vulnerability / Performance metric / Domain Name System Security Extensions / Computer security / Security / Data security

PDF Document

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2014-06-05 07:48:28
UPDATE