Home    |Web Directory    |Metasearch    |Message Boards    |Classified Ads|

Web Directory

Home

Web Directory

Metasearch

Message Boards

Classified Ads








Policy (178)

Categories:

Sites:

http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.5867
» A Structured Approach to Computer Security Open in a new browser window
   A security policy is a set of rules written in general terms stating what is permitted and what is not permitted in a system during normal operation.
   http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.5867
http://members.iinet.net.au/~colinwee/mbt/acceptableuse/
» Acceptable Use Policy Report Open in a new browser window
   A report on Acceptable Usage Policy: what corporations expect of it, a case study, and a framework for creating your own policy.
   http://members.iinet.net.au/~colinwee/mbt/acceptableuse/
http://www.sans.org/rr/papers/50/535.pdf
» An Overview of Corporate Computer User Policy Open in a new browser window
   Article discusses the elements of a corporate security policy, which it calls the gateway to a company`s intellectual property. The main threat to information security within a company is its employees.
   http://www.sans.org/rr/papers/50/535.pdf
http://enterprisesecurity.symantec.com/article.cfm?articleid=42&PID=372347
» Best Practices in Network Security Open in a new browser window
   Knowing how and what to protect and what controls to put in place is difficult. It takes security management, including planning, policy development and the design of procedures.
   http://enterprisesecurity.symantec.com/article.cfm?articleid=42&PID=372347
http://csrc.nist.gov/nissc/1997/panels/isptg/pescatore/html/
» Building Effective, Tailored Information Security Policy Open in a new browser window
   20th NISSC Internet Technical Security Policy Panel
   http://csrc.nist.gov/nissc/1997/panels/isptg/pescatore/html/
http://www.windowsecurity.com/pages/security-policy.pdf
» Building and Implementing a Successful Information Security Policy Open in a new browser window
   White paper providing the reader with new and innovative aspects on the process of building a Security Policy, as well as managing a Security Awareness Program.
   http://www.windowsecurity.com/pages/security-policy.pdf
http://www.efc.ca/pages/doc/crypto-export.html
» Canada's Export Controls Open in a new browser window
   Unofficial / unverified article describing Canada's export controls on cryptographic software.
   http://www.efc.ca/pages/doc/crypto-export.html
http://www.controlit.org
» CobiT User Group Open in a new browser window
   International user group and hub for CobiT, the emerging IT control and security methodology.
   http://www.controlit.org
http://www.niap-ccevs.org/cc-scheme/
» Common Criteria Evaluation and Validation Scheme Open in a new browser window
   Provides details of this US government scheme.
   http://www.niap-ccevs.org/cc-scheme/
http://www.networkworld.com/newsletters/sec/0913sec1.html
» Do you have an intrusion detection response plan? Open in a new browser window
   Discussion of what should go into the creation of an intrusion detection plan and the expected results.
   http://www.networkworld.com/newsletters/sec/0913sec1.html
http://www.fismapedia.org
» FISMApedia Open in a new browser window
   An information resource for Federal IT security policies, including the FISMA, HSPD-12, FDCC, DIACAP, NIACAP and OMB directives.
   http://www.fismapedia.org
http://www.giac.org/practical/David_Quay_GSEC.doc
» Formulating a Wireless LAN Security Policy: Relevant Issues, Considerations and Implications Open in a new browser window
   [Word Document] This paper represents the security issues related to the use of wireless (vs wired) LAN technology and recommends a number of key implementation guidelines to ensure the secure deployment of wireless LAN services in the company.
   http://www.giac.org/practical/David_Quay_GSEC.doc
http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf
» GASSP Home Page Open in a new browser window
   Generally Accepted System Security Principles, developed by The International Information Security Foundation.
   http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf
http://www.giac.org/practical/Kerry_McConnell_GSEC.doc
» How to Develop Good Security Policies and Tips on Assessment and Enforcement Open in a new browser window
   [Word Document] Invest the time up front to carefully develop sound policies and then identify ways to gauge their effectiveness and assess the level of compliance within your organization. Commit to spending the time and resources required to ensure that
   http://www.giac.org/practical/Kerry_McConnell_GSEC.doc
http://arc.education.purdue.edu/protocol/home_page.htm
» IASEP Data Security Protocol Open in a new browser window
   An archive website from the Purdue Research Foundation, containing a range of example security policy sets.
   http://arc.education.purdue.edu/protocol/home_page.htm
http://www.boran.ie/security/welcome1.html
» IT Security Cookbook Open in a new browser window
   A guide to computer and network security with a strong focus on writing and implementing security policy. This is primarily for security managers and system administrators.
   http://www.boran.ie/security/welcome1.html
http://ist.mit.edu/security
» IT Security at MIT Open in a new browser window
   Provides a wide range of policies, papers and related resources.
   http://ist.mit.edu/security
http://www.itworld.com/IWD010529securityshuman
» ITworld.com - Security's human side Open in a new browser window
   IT World article - essentially a review of Pentasafe's VigilEnt security policy management product.
   http://www.itworld.com/IWD010529securityshuman
http://www.neupart.com
» Information Security Policies Open in a new browser window
   Make and manage security policies. Run awareness programs with audits and e-learning to build a human firewall.
   http://www.neupart.com
http://www.blackmagic.com/ses/bruceg/progmgt.html
» Information Security Program Development Open in a new browser window
   Security standards are needed by organizations because of the amount of information, the value of the information, and ease with which the information can be manipulated or moved.
   http://www.blackmagic.com/ses/bruceg/progmgt.html
http://www.isecom.org
» Institute for Security and Open Methodologies (ISECOM) Open in a new browser window
   Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing.
   http://www.isecom.org
http://www.w3.org/P3P/details.html
» Make Your Web Site P3P Compliant Open in a new browser window
   How to create and publish your company's platform for privacy performance policy, a W3C initiative, in 6 steps.
   http://www.w3.org/P3P/details.html
http://www.isecom.org/projects/osstmm.shtml
» OSSTMM: Open Source Security Testing Methodology Manual Open in a new browser window
   A widely used, peer-reviewed, methodology for performing security tests.
   http://www.isecom.org/projects/osstmm.shtml
http://www.w3.org/TR/NOTE-P3P10-principles
» P3P Guiding Principles Open in a new browser window
   Principles behind the W3C Platform for Privacy Preferences initiative.
   http://www.w3.org/TR/NOTE-P3P10-principles
http://tools.ietf.org/html/rfc2196
» RFC2196 (Site Security Handbook) Open in a new browser window
   A guide to developing computer security policies and procedures for sites that have systems on the Internet. Published 1997.
   http://tools.ietf.org/html/rfc2196
http://www.adrianmizzi.com
» Return on Information Security Investment Open in a new browser window
   Assess your company's Return on Information Security Investment
   http://www.adrianmizzi.com
http://www.sans.org/rr/
» SANS InfoSec Reading Room Open in a new browser window
   Articles on security policy and other information security topics.
   http://www.sans.org/rr/
http://www.securezone.com
» SecureZone Open in a new browser window
   Information portal with focus on policies, protocols and standards
   http://www.securezone.com
http://www.securitydocs.com/Security_Policies
» SecurityDocs Open in a new browser window
   A substantial collection of papers and articles on the development and implementation of security policies.
   http://www.securitydocs.com/Security_Policies
http://www.giac.org/practical/jack_albright_gsec.doc
» The Basics of an IT Security Policy Open in a new browser window
   This paper is intended to address the importance of having a written and enforceable Information Technology (IT) security policy, and to provide an overview of the necessary components of an effective policy.
   http://www.giac.org/practical/jack_albright_gsec.doc
http://www.isfsecuritystandard.com
» The Information Security Forum Open in a new browser window
   It has produced the standard to provide guidelines on all aspects of information security including IT, data, and computer controls.
   http://www.isfsecuritystandard.com
http://www.cms.hhs.gov/InformationSecurity/
» U.S. Department of Health and Human Services Open in a new browser window
   Security standards, transactions and code set standards, identifier standards, mailing lists, implementation guides, and administrative simplification.
   http://www.cms.hhs.gov/InformationSecurity/
http://www.sans.org/rr/papers/index.php?id=135
» Understanding the Virus Threat and Developing Effective Anti-Virus Policy Open in a new browser window
   This paper focuses on providing the reader with an overview of the current virus landscape and aids in developing best practice anti-virus policies.
   http://www.sans.org/rr/papers/index.php?id=135
http://www.giac.org/practical/Caroline_Reyes_GSEC.doc
» What makes a good security policy and why is one necessary? Open in a new browser window
   Security does not come from automated applications, rather it is compromised of security applications or systems, processes and procedures and the personnel to implement both the systems and processes. In order to properly address security, the most funda
   http://www.giac.org/practical/Caroline_Reyes_GSEC.doc
http://windowsitpro.com/article/articleid/9764/whats-your-policy.html
» What's Your Policy? Open in a new browser window
   Provides an article to discuss and explain the need for a comprehensive security policy, and some pointers to useful resources.
   http://windowsitpro.com/article/articleid/9764/whats-your-policy.html
http://windowsitpro.com/article/articleid/9169/group-policy-and-security.html
» Windows 2000 Group Policy and Security Open in a new browser window
   The use of Group Policy to simplify the network security tasks that you face as a network administrator. With Group Policy, you can ensure that the machines on your network remain in a secure configuration after you deploy them.
   http://windowsitpro.com/article/articleid/9169/group-policy-and-security.html

Category Editor: bushguy

Last Updated: 2008-02-12 18:20:15





Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor

The content of this directory is based on the Open Directory and has been modified by GoSearchFor.com

Free previews by Thumbshots.org