Network security policy

Results: 1254



#Item
461Computer security / Cryptographic software / Password policy / Self-service password reset / Password / Security / Cryptography

ITS Password Instructions In Information Technology Services (ITS) we have formed a security committee and discussed steps to tighten computer/ network related security on and off campus. One of the most fundamental ways

Add to Reading List

Source URL: www.pasadena.edu

Language: English - Date: 2014-09-17 14:44:50
462Cryptographic software / HMAC / Hashing / FIPS 140 / Advanced Encryption Standard / Cisco IOS / Cisco Systems / Crypto++ / Network Security Services / Cryptography / Cryptography standards / Computing

Microsoft Word - IC2M Security Policy_rel(1.5).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-15 15:13:53
463Brocade Communications Systems / 100 Gigabit Ethernet / Toyota MR2 / Network switch / Server hardware / Computer networking / Private transport / Ethernet / Transport

Microsoft Word - Brocade_NetIron_5.6.00aa_Security_Policy_(Brocade_13.12.17_V1.4).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-03 10:51:11
464National security / Assistant Secretary of Defense for Networks and Information Integration / Network management / Science and technology in the United States / Defense Information Systems Agency / Under Secretary of Defense for Policy / Defense Technical Information Center / Office of the Secretary of Defense / Department of Defense Architecture Framework / United States federal executive departments / United States Department of Defense / Military organization

DoD Instruction[removed], November 25, 2014

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2014-11-25 15:01:03
465Mobile device management / Computer network security / Bring your own device / Information security / Internet privacy / Privacy policy / Check Point / Privacy / Data security / Technology / Computing / Ethics

ISSA_WebConferencesLogo7.6.12

Add to Reading List

Source URL: www.infolawgroup.com

Language: English - Date: 2012-12-11 15:03:01
466Crime prevention / National security / Computer network security / Information security / Common Criteria / Trusted computing base / Trusted Computer System Evaluation Criteria / Security policy / Personal digital assistant / Security / Computer security / Public safety

Themes and Highlights of the New Security Paradigms Workshop 2000 Chair: Steven J. Greenwald Independent INFOSEC Consultant 2521 NE 135 Street

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
467Cyberwarfare / Crime prevention / National security / Data security / Information security / Security controls / Security service / Separation of mechanism and policy / Trusted Computer System Evaluation Criteria / Computer security / Computer network security / Security

Interdependency Analysis Richard K. McAllister Sparta Incorporated, Columbia MD[removed]ext[removed]removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
468Secure communication / Cyberwarfare / Data security / National security / Personally identifiable information / Data breach / Internet privacy / Privacy / Government procurement in the United States / Security / Computer security / Computer network security

Date Adopted Policy Title: Student Data Privacy and Security[removed]

Add to Reading List

Source URL: www.sd282.org

Language: English - Date: 2014-09-11 17:57:18
469Computing / Computer network security / Health informatics / Information security management system / Information security / Security controls / ISO/IEC 27002 / Vulnerability / EHealth / Computer security / Data security / Security

Microsoft Word - eHS Security Policy v 1.doc

Add to Reading List

Source URL: www.ehealthsask.ca

Language: English - Date: 2015-01-02 19:11:25
470Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Law / Computer network security / Security controls / Protected health information / Computer security / Data security / Security

RETIRED--FOR HISTORICAL PURPOSES ONLY Health and Human Services Agency California Office of HIPAA Implementation POLICY MEMORANDUM TO:

Add to Reading List

Source URL: www.ohii.ca.gov

Language: English
UPDATE