Information security standards

Results: 2339



#Item
41Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:32:35
42Economy / Business / Payment systems / Financial services / Embedded systems / Payment cards / E-commerce / Information privacy / Skim / Cash machine / Card reader / Personal identification number

Skimming A Resource Guide from the PCI Security Standards Council WHAT IS SKIMMING? Skimming is copying payment card numbers and personal identification numbers (PIN)

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-07-29 10:58:29
43Computing / Information technology management / Information technology / Data security / Security / Standards organizations / Computer security / Regulatory compliance / ISO/IEC 27002 / ISO 31000 / ISO/IEC 27001:2013 / Information security

IS THIS YOU - - IT Manager / IT Director / CIO / CTO /Program or Product Management / Quality Manager? Roles and Responsibilities/Accountabilities - more than titles - there are regulatory or legal obligations that you a

Add to Reading List

Source URL: www.dignusgroup.com

Language: English - Date: 2013-07-28 21:24:12
44Law enforcement / Government / United States intelligence agencies / National security / Military intelligence / Crime prevention / Intelligence-led policing / Intelligence sharing / Information Sharing Environment / Central Intelligence Agency / Intelligence analysis / Secretariat of Intelligence

Minimum Criminal Intelligence Training Standards for Law Enforcement and Other Criminal Justice Agencies in the United States Findings and Recommendations

Add to Reading List

Source URL: www.ncirc.gov

Language: English - Date: 2009-07-02 11:39:46
45Cryptography / International Electrotechnical Commission / Standards organizations / BSI Group / Kitemark / Public key certificate / Identity document

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: Þjóðskrá Íslands (Registers Iceland)

Add to Reading List

Source URL: www.skra.is

Language: English - Date: 2015-12-11 09:47:50
46Computer access control / Computer security / Federated identity / Identity management / Cloud standards / OpenID / Authentication / Single sign-on / Identity provider / Password / Information Card / OAuth

An Investigation into a Usable Identity Binding Service Tristan Lewis William Kim Jill L. Drury

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:32
47SarbanesOxley Act / Accounting / Computer security / Auditing / Risk / International standards / Standards / Professional studies / OMB Circular A-123 / SSAE 16 / Federal Information Security Management Act / Internal control

Date: July 22, 2016 In reply refer to:

Add to Reading List

Source URL: nfc.usda.gov

Language: English - Date: 2016-07-25 15:31:39
48IEEE standards / Management / Information systems / Security / Human resource management / Human resource management system / Request for proposal / Project management / Risk management / Business continuity planning / Business process modeling / Systems engineering

Base Period: Date of IAA award through 24 months1 0001 Project management and implementation of IFMS/HRIS services: Development, implementation, and integration services, and Data migration;

Add to Reading List

Source URL: www.fai.gov

Language: English - Date: 2015-04-20 14:59:33
49Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Federal Information Security Management Act / Cryptographic Module Testing Laboratory / FIPS 140-3

Microsoft Word - Outline_Intro_FIPS140-2.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:46
50Computer security / Quality / Cryptography / Data security / Information security / National security / Management system

QUALITY AND INFORMATION SECURITY MANAGEMENT SYSTEM POLICY HGC’s Quality and Information Security Policy Statement: Operational standards of efficiency, effectiveness, quality and information security are observed in al

Add to Reading List

Source URL: www.hgc.gov.ph

Language: English - Date: 2016-04-15 11:52:38
UPDATE