Federal Information Security Management Act

Results: 1715



#Item
761Federal Information Security Management Act / National Institute of Standards and Technology / Information security / Vulnerability / Security controls / Security risk / Software assurance / NIST Special Publication 800-53 / Security Content Automation Protocol / Computer security / Security / Cyberwarfare

Testimony of Cita M. Furlani Acting Director Information Technology Laboratory

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-08-30 15:11:00
762Cyberwarfare / National Institute of Standards and Technology / Risk management / Federal Information Security Management Act / Standards for Security Categorization of Federal Information and Information Systems / Risk management framework / Information security / Information systems / Security controls / Computer security / Security / Data security

Microsoft Word - QSG - Categorize - Detailed Organizational Guide[removed]doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-02-11 00:00:00
763Data security / Computing / National Institute of Standards and Technology / Law / Federal Information Security Management Act / Information security / Computer Security Act / FIPS 140-2 / Computer security / Computer law / Security

ISPAB Letter: NIST Cryptographic Standards

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-01-16 16:12:07
764Risk / Risk management / Federal Information Security Management Act / Information security / Continuous monitoring / Vulnerability / Risk management framework / Security risk / Security controls / Computer security / Security / Data security

Monitor - Detailed Organizational Guide

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-05-13 01:00:00
765Security / Data security / Government procurement in the United States / United States administrative law / Information security / Federal Information Security Management Act / SMS / Requirement / Incident management / Computer security / Technology / Public safety

Instructions for Completing the NOAALink Worksheet The NOAALink worksheet is the first step in initiating a request with NOAALink. Required fields will be noted within the worksheet; you will not be able to submit the w

Add to Reading List

Source URL: www.cio.noaa.gov

Language: English - Date: 2014-03-05 13:41:30
766Data security / Cyberwarfare / Computer network security / Telecommunications Industry Association / International Multilateral Partnership Against Cyber Threats / Security controls / Cyber-security regulation / United States Computer Emergency Readiness Team / Federal Information Security Management Act / Security / Computer security / National security

July 29, 2013 Via Electronic Filing ([removed]) Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Add to Reading List

Source URL: www.tiaonline.org

Language: English - Date: 2013-07-30 09:52:17
767Disaster preparedness / Humanitarian aid / Occupational safety and health / Federal Emergency Management Agency / Emergency service / Emergency / Oklahoma Emergency Management Act / Water security and emergency preparedness / Public safety / Emergency management / Management

This EXAMPLE is for a small water system and represents the minimum information required. The information required for your plan will be based on the complexity of your water system. Emergency/Disaster Response Plan To c

Add to Reading List

Source URL: www.cdph.ca.gov

Language: English - Date: 2014-09-01 22:06:33
768United States Department of Homeland Security / Emergency services / Federal Emergency Management Agency / EMPG / National Incident Management System / Homeland Security Appropriations Act / California Emergency Management Agency / Emergency Management Assistance Compact / Stafford Disaster Relief and Emergency Assistance Act / Public safety / Emergency management / Government

Department of Homeland Security Funding Opportunity Announcement FY 2014 Emergency Management Performance Grant Overview Information Issued By U.S. Department of Homeland Security, Federal Emergency Management Agency,

Add to Reading List

Source URL: publicsafety.utah.gov

Language: English - Date: 2014-04-21 17:35:23
769Computing / National Institute of Standards and Technology / Risk analysis / Security controls / Standards for Security Categorization of Federal Information and Information Systems / Health Insurance Portability and Accountability Act / NIST Special Publication 800-53 / IT risk management / Computer security / Data security / Security

DATA MANAGEMENT PLAN GUIDELINES The data management plan guidelines contain four steps. You are being asked to describe the actions that you will take to address these protections specific to this research request. The

Add to Reading List

Source URL: www.resdac.org

Language: English - Date: 2013-09-06 11:43:52
770Computing / National Institute of Standards and Technology / Computer network security / Security controls / Standards for Security Categorization of Federal Information and Information Systems / Data management plan / Health Insurance Portability and Accountability Act / NIST Special Publication 800-53 / IT risk management / Computer security / Data security / Security

DATA MANAGEMENT PLAN GUIDELINES The data management plan guidelines contain four steps. You are being asked to describe the actions that you will take to address these protections specific to this research request. The f

Add to Reading List

Source URL: www.resdac.org

Language: English - Date: 2014-01-16 12:42:09
UPDATE