Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • *[[Computer security]] *[[Computer network security]] ...
    1 KB (168 words) - 18:26, 14 June 2007
  • ..., a user has to type his name, and that name is then used elsewhere in the computer program, care must be taken that when a user enters a blank name, the progr ...years of testing and debugging, and while they may provide a great deal of security, they typically have no way to guarantee that a new bug or exploit won't be ...
    2 KB (343 words) - 18:39, 14 June 2007
  • ...4. Computer Communications Security 75-84 (1994); Kaufman, et al., Network Security, supra note 22, at 101-27; Nechvatal, Public Key Cryptography, in Comtempor ...
    363 bytes (43 words) - 12:40, 16 October 2014
  • ...advantage of the surprise attack while they are still unknown to computer security professionals. Recent history certainly does show us an increasing rate of ...stand the nature of vulnerabilities and their exploitation by individuals, computer worms and viruses. ...
    4 KB (570 words) - 19:02, 14 June 2007
  • =='''Best Practices Security Incident Response Program Presentation'''== ::Information Security Staff ...
    2 KB (315 words) - 18:46, 25 September 2006
  • =='''Logical Security'''== ...n a computer network or a computer workstation. It is a subset of computer security.<br> ...
    7 KB (1,093 words) - 19:00, 5 March 2007
  • '''DS 5.10 Network Security '''<br> ...s and related management procedures (e.g., firewalls, security appliances, network segmentation, and intrusion detection) are used to authorize access and con ...
    6 KB (781 words) - 12:31, 23 June 2006
  • ...nto key systems. Firewalls are a key protection mechanism for any computer network.<br> ...I-1.1.1:|PCI-1.1.1 A formal process for approving and testing all external network connections and changes to the firewall configuration.]]<br> ...
    5 KB (702 words) - 12:20, 16 June 2010
  • ...n of an interference with the owner's right to exclusive possession of the computer. ...here the statutory requirement that the defendant knowingly gain access to computer material is not supported by the factual allegations of the indictment and ...
    5 KB (763 words) - 12:30, 18 February 2009
  • :* Replicate itself within a computer and transmit itself between computers. ...isk of malicious code by implementing appropriate controls at the host and network level to prevent and detect malicious code, as well as engage in appropriat ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ::'''2. Risk: Computer equipment may be compromised by accidental damage.''' :::a. [[SOX.2.6.1:|'''SOX.2.6.1''']] Physical storage of computer equipment should be appropriately protected to prevent the risk of accident ...
    5 KB (674 words) - 18:14, 21 June 2006
  • ...controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> :*'''[[Security Policy:|'''Security Policy''']]<br> ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • Links to helpful or interesting information security documents.<br> :This paper discusses common security vulnerabilities in PHP applications.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • '''Build and Maintain a Secure Network''' ...ment 2: Do not use vendor-supplied defaults for system passwords and other security parameters.''']] ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • ...is a term used in Title 18, Section 1030 of the United States Code, (the [[Computer Fraud and Abuse Act]]) which prohibits a number of different kinds of condu <blockquote>a computer—<br/> ...
    5 KB (773 words) - 11:40, 27 August 2011
  • ==Data Security== ...assets. All of the controls discussed so far, whether at the perimeters, network or host levels, or embodied in actions taken by people, contribute to the a ...
    9 KB (1,246 words) - 18:20, 10 April 2007
  • ...elecommunications equipment within an operations center will have a higher security zone than I/O operations, with the media used by that equipment stored at y ...en>'''HORSE FACTS:'''</font> Financial institutions should define physical security zones and implement appropriate preventative and detective controls in each ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...tackers are unlikely to find them. The technique stands in contrast with [[security by design]], although many real-world projects include elements of both str ...aphy was disturbing to the US government, which seems to have been using a security through obscurity analysis to support its opposition to such work. ...
    11 KB (1,798 words) - 14:44, 14 June 2007
  • ...ive, detective and corrective measures are in place (especially up-to-date security patches and virus control) across the organization to protect information s ...across the organization to protect information systems and technology from computer viruses. ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ...ecurity]] which in turn grew out of practices and procedures of [[computer security]]. ...ter science. Therefore, IA is best thought of as a superset of information security. ...
    7 KB (983 words) - 10:41, 15 April 2012
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)