Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ==Sources of standards for Information Security== ...n Security Management System]]s" are of particular interest to information security professionals.<br> ...
    2 KB (287 words) - 14:29, 8 March 2007
  • ...security practices for such systems. It requires the creation of computer security plans, and the appropriate training of system users or owners where the sys It has been superseded by the [[FISMA | Federal Information Security Management Act of 2002]] ...
    1 KB (168 words) - 11:37, 23 May 2010
  • '''BS 7799''' was a standard originally published by British Standards Institution (BSI) in 1995. It was written by the United Kingdom Government' ...n revised in June 2005 and finally incorporated in the ISO 27000 series of standards as [[ISO/IEC 27002]] in July 2007. ...
    2 KB (249 words) - 10:56, 27 October 2012
  • ...led '''blackers''', because they convert RED signals to BLACK. [[TEMPEST]] standards spelled out in NSTISSAM TEMPEST 2-95 specify shielding or a minimum physica *[[Security engineering]] ...
    1 KB (170 words) - 16:06, 14 June 2007
  • ...controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> :*'''[[Security Policy:|'''Security Policy''']]<br> ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • :'''Avoid Session Management Pitfalls:''' [[Media:session-management-security.pdf]]<br> ...Configuration Management for Security:''' [[Media:configuration-management-security.pdf]] <br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ==Physical and Environmental Security== '''Physical security''' describes measures that prevent or deter attackers from accessing a faci ...
    4 KB (592 words) - 19:28, 14 June 2007
  • ...mation technology - Security techniques - Code of practice for information security management''. The current standard is a revision of the version published i ...ining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C-I-A tria ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...yer's Guide to the Emerging Legal Issues 14 ( Joseph F. Ruh, Jr., ed., The Computer Law Association 1996). ...
    1 KB (144 words) - 12:26, 16 October 2014
  • ==Personnel Security== ...loyees, contractors, or third-party employees can exploit their legitimate computer access for malicious, fraudulent, or economic reasons. Additionally, the de ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ...mation technology - Security techniques - Code of practice for information security management''. ...erwise unchanged) in 2007 to align with the other [[ISO/IEC 27000-series]] standards. ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...n of an interference with the owner's right to exclusive possession of the computer. ...here the statutory requirement that the defendant knowingly gain access to computer material is not supported by the factual allegations of the indictment and ...
    5 KB (763 words) - 12:30, 18 February 2009
  • ...ecurity]] which in turn grew out of practices and procedures of [[computer security]]. ...ter science. Therefore, IA is best thought of as a superset of information security. ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...d by the organization to specific standards and is not alterable by mobile computer users.'''<br> :* Examine associated endpoint firewall and security software configurations to verify that administration is restricted only au ...
    2 KB (267 words) - 10:51, 16 June 2010
  • '''PO 8.3 Development and Acquisition Standards'''<br> ...e standards; interoperability; system performance efficiency; scalability; standards for development and testing; validation against requirements; test plans; a ...
    6 KB (863 words) - 13:12, 23 June 2006
  • What are assets? Asset Management from a corporate governance and information security perspective is not just about 'IT' Assets. It is about the management, cont ...is taken from and attributable to UK-National Health Services Information Security it I believe adequately covers what we can do/do with data. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...tackers are unlikely to find them. The technique stands in contrast with [[security by design]], although many real-world projects include elements of both str ...aphy was disturbing to the US government, which seems to have been using a security through obscurity analysis to support its opposition to such work. ...
    11 KB (1,798 words) - 14:44, 14 June 2007
  • ...athways into key systems. Firewalls are a key protection mechanism for any computer network.<br> :'''[[PCI-1.1:|PCI-1.1 Establish firewall configuration standards that include:]]'''<br> ...
    5 KB (702 words) - 12:20, 16 June 2010
  • ...he Secretary of Commerce of standards and guidelines pertaining to Federal computer systems; (5) designate executive agents for information technology acquisit ...ive such standards when compliance would adversely affect the mission of a computer operator or cause a major adverse financial impact on such operator which i ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • '''DS 5.10 Network Security '''<br> ...at security techniques and related management procedures (e.g., firewalls, security appliances, network segmentation, and intrusion detection) are used to auth ...
    6 KB (781 words) - 12:31, 23 June 2006
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)