Security level management

Results: 626



#Item
511Crime prevention / Electronic commerce / National security / Secure communication / Public safety / Security / Computer network security / Computer security

School Planning & Management is written and edited to meet the business and information needs of the district-level buying team. READERSHIP • The Executive Level: Superintendents and Presidents of School Boards. • Th

Add to Reading List

Source URL: webspm.1105cms01.com

Language: English - Date: 2013-09-11 14:41:23
512Management / Risk management / Design for X / Emergency management / Risk / Technology assessment / Ethics / Evaluation / Impact assessment

The Societal Dimensions On the highest aggregation level there are four societal dimensions that form the core of SIAM’s security technology assessment procedures: Security, Trust, Efficiency and Freedom Infringements.

Add to Reading List

Source URL: www.tu-berlin.de

Language: English - Date: 2014-03-13 15:52:39
513Actuarial science / System safety / Safety Management Systems / Safety Integrity Level / Risk assessment / Safety culture / Risk management / Functional Safety / IEC 61508 / Risk / Safety / Security

Microsoft Word - irsc2013Final00077.doc

Add to Reading List

Source URL: www.intlrailsafety.com

Language: English - Date: 2014-01-21 15:29:25
514Password / Identity management systems / Password policy / Password strength / Security / Cryptography / Computer security

Effective[removed]: As part of our ongoing effort to ensure the highest level of OUTREACH System password security, the Cabinet for Health and Family Services and the KY Division of Laboratory Services conducts routine a

Add to Reading List

Source URL: www.chfs.ky.gov

Language: English - Date: 2014-08-20 08:22:50
515Privacy law / Law / Medicine / Health informatics / Capitation / Medical billing / Practice management software / Health / Data privacy / Health Insurance Portability and Accountability Act

ProviderOne Security Profiles and Descriptions Staff can be assigned one or more security profiles to meet their job duties and provide them the level of access necessary in ProviderOne. Security Profile Allows the User

Add to Reading List

Source URL: www.hca.wa.gov

Language: English - Date: 2013-08-15 16:07:35
516Key management / Identity management / Access token / Password / Key size / Token / Transaction authentication number / PKCS / Access control / Cryptography / Security / Computer security

Luna2 Security Policies DOCUMENT CLASS: CODE NAME: SECURITY LEVEL: ORIGINATOR: DEPARTMENT:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
517HMAC / Hashing / Key generation / Key / Microsoft CryptoAPI / Index of cryptography articles / Cryptography / Cryptographic software / Key management

BeCrypt Ltd. BeCrypt Cryptographic Library v 2.0 FIPS[removed]Non-Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-11-24 00:00:00
518Safety / Actuarial science / Emergency management / Risk management / Safety Management Systems / Traffic collision / Accident / Hazard / Level crossing / Risk / Transport / Security

Paper-Review and Assessment of the Korea Rail’s Safety Performance.hwp

Add to Reading List

Source URL: www.intlrailsafety.com

Language: English - Date: 2009-09-10 13:38:44
519Probability / Security / School violence / Violence / School counselor / Salem / Probation officer / Risk management / Risk assessment / Ethics / Crime / Risk

STUDENT THREAT ASSESSMENT AND MANAGEMENT SYSTEM Level I Screening – Protocol This protocol is to be used by staff who have been trained through Level I Screening In-service. The results of this survey do not predict fu

Add to Reading List

Source URL: www.k12.wa.us

Language: English - Date: 2010-09-22 13:43:56
520Computing / Software project management / Method engineering / Evaluation / Baseline / Configuration management / Vulnerability / Common Criteria / CimTrak / Computer security / Computer network security / Information technology management

Software Supplier Words Software Supplier Words REQUIREMENTS. The following are broad categories of short and long term goals and expectations for this SOO. The descriptions are in general terms at the objectives level

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2006-04-11 15:56:23
UPDATE