Security Information Service

Results: 3404



#Item
511Cyberwarfare / Computer network security / Risk management / Security controls / Information security / Vulnerability / Information assurance / Security risk / Risk management framework / Computer security / Security / Data security

Community Gold Standard Version 2.0 National Security Agency/Central Security Service INFORMATION

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-03-31 20:38:56
512Transportation in the United States / Aftermath of the September 11 attacks / Crime prevention / Transportation Security Administration / Sensitive Security Information / Federal Air Marshal Service / Full body scanner / Airport security / Robert MacLean / Security / Aviation security / United States Department of Homeland Security

United States Government Accountability Office Report to Congressional Requesters  February 2015

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2015-03-11 17:14:28
513Public safety / Computer security / Information technology management / Computer network security / Service-level agreement / Information security / Security / Crime prevention / National security

Quality of Protection Determination for Web Services ∗ Artsiom Yautsiukhin University of Trento [removed]

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2010-06-18 12:29:02
514Public safety / Business software / TRAC / Information security / Prevention / Computer security / Security / Data security

New York State Department of Financial Services Update on Cyber Security in the Banking Sector: Third Party Service Providers April 2015

Add to Reading List

Source URL: www.dfs.ny.gov

Language: English - Date: 2015-04-08 16:34:08
515Information technology management / Cloud storage / Data security / Computer network security / Data center / Networks / Backup / Remote backup service / Cloud backup / Computing / Data management / Concurrent computing

Technology overview CyberSecure Data Protection Australian Cloud Storage Round-the-clock data protection for your business.

Add to Reading List

Source URL: download.cybersecure.com.au

Language: English - Date: 2015-03-15 03:26:11
516Computer network security / Contract law / Information technology management / Outsourcing / Service-level agreement / Security token / Information security / Integrated Windows Authentication / Public key infrastructure / Cryptography / Security / Computer security

STANDARD TERMS AND CONDITIONS

Add to Reading List

Source URL: vanguard.business.gov.au

Language: English - Date: 2015-01-22 19:36:59
517Data management / Data security / Computer data / Backup software / Backup / Remote backup service / Data center / Business continuity planning / Data loss / Computing / Information technology management / Data

DOC Document

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-04-18 18:14:37
518Data security / Backup / Remote backup service / IBM Tivoli Storage Manager / Backup software / Computing / Software

Email Backup Procedure (MPF1122) GOVERNING POLICY This procedure is made under the Managing University IT Systems and Support Policy. SCOPE This procedure applies to the backup of servers operated by Information Technolo

Add to Reading List

Source URL: policy.unimelb.edu.au

Language: English
519Surveillance / Mass surveillance / National Security Agency / Espionage / Cascading Style Sheets / Central Security Service / Security clearance / NSA warrantless surveillance controversy / National security / Security / United States government secrecy

Review of NSA/CSS Information for Public Dissemination

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-07 00:18:50
520Security / Data security / Cisco Systems / Videotelephony / Certis CISCO / Security controls / Information security / Attack / Threat / Computer security / Cyberwarfare / Computer network security

At-a-Glance Cisco Security Incident Response Service Today’s Dynamic Threat Landscape Organizations are under attack everywhere. In 2014, security breaches

Add to Reading List

Source URL: www.cisco.com

Language: English
UPDATE