Home |
Policy (178) Categories:
Sites:
» A Structured Approach to Computer Security
A security policy is a set of rules written in general terms stating what is permitted and what is not permitted in a system during normal operation. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.5867 » Acceptable Use Policy Report
A report on Acceptable Usage Policy: what corporations expect of it, a case study, and a framework for creating your own policy. http://members.iinet.net.au/~colinwee/mbt/acceptableuse/ » An Overview of Corporate Computer User Policy
Article discusses the elements of a corporate security policy, which it calls the gateway to a company`s intellectual property. The main threat to information security within a company is its employees. http://www.sans.org/rr/papers/50/535.pdf » Best Practices in Network Security
Knowing how and what to protect and what controls to put in place is difficult. It takes security management, including planning, policy development and the design of procedures. http://enterprisesecurity.symantec.com/article.cfm?articleid=42&PID=372347 » Building Effective, Tailored Information Security Policy
20th NISSC Internet Technical Security Policy Panel http://csrc.nist.gov/nissc/1997/panels/isptg/pescatore/html/ » Building and Implementing a Successful Information Security Policy
White paper providing the reader with new and innovative aspects on the process of building a Security Policy, as well as managing a Security Awareness Program. http://www.windowsecurity.com/pages/security-policy.pdf » Canada's Export Controls
Unofficial / unverified article describing Canada's export controls on cryptographic software. http://www.efc.ca/pages/doc/crypto-export.html » CobiT User Group
International user group and hub for CobiT, the emerging IT control and security methodology. http://www.controlit.org » Common Criteria Evaluation and Validation Scheme
Provides details of this US government scheme. http://www.niap-ccevs.org/cc-scheme/ » Do you have an intrusion detection response plan?
Discussion of what should go into the creation of an intrusion detection plan and the expected results. http://www.networkworld.com/newsletters/sec/0913sec1.html » FISMApedia
An information resource for Federal IT security policies, including the FISMA, HSPD-12, FDCC, DIACAP, NIACAP and OMB directives. http://www.fismapedia.org » Formulating a Wireless LAN Security Policy: Relevant Issues, Considerations and Implications
[Word Document] This paper represents the security issues related to the use of wireless (vs wired) LAN technology and recommends a number of key implementation guidelines to ensure the secure deployment of wireless LAN services in the company. http://www.giac.org/practical/David_Quay_GSEC.doc » GASSP Home Page
Generally Accepted System Security Principles, developed by The International Information Security Foundation. http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf » How to Develop Good Security Policies and Tips on Assessment and Enforcement
[Word Document] Invest the time up front to carefully develop sound policies and then identify ways to gauge their effectiveness and assess the level of compliance within your organization. Commit to spending the time and resources required to ensure that http://www.giac.org/practical/Kerry_McConnell_GSEC.doc » IASEP Data Security Protocol
An archive website from the Purdue Research Foundation, containing a range of example security policy sets. http://arc.education.purdue.edu/protocol/home_page.htm » IT Security Cookbook
A guide to computer and network security with a strong focus on writing and implementing security policy. This is primarily for security managers and system administrators. http://www.boran.ie/security/welcome1.html » IT Security at MIT
Provides a wide range of policies, papers and related resources. http://ist.mit.edu/security » ITworld.com - Security's human side
IT World article - essentially a review of Pentasafe's VigilEnt security policy management product. http://www.itworld.com/IWD010529securityshuman » Information Security Policies
Make and manage security policies. Run awareness programs with audits and e-learning to build a human firewall. http://www.neupart.com » Information Security Program Development
Security standards are needed by organizations because of the amount of information, the value of the information, and ease with which the information can be manipulated or moved. http://www.blackmagic.com/ses/bruceg/progmgt.html » Institute for Security and Open Methodologies (ISECOM)
Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing. http://www.isecom.org » Make Your Web Site P3P Compliant
How to create and publish your company's platform for privacy performance policy, a W3C initiative, in 6 steps. http://www.w3.org/P3P/details.html » OSSTMM: Open Source Security Testing Methodology Manual
A widely used, peer-reviewed, methodology for performing security tests. http://www.isecom.org/projects/osstmm.shtml » P3P Guiding Principles
Principles behind the W3C Platform for Privacy Preferences initiative. http://www.w3.org/TR/NOTE-P3P10-principles » RFC2196 (Site Security Handbook)
A guide to developing computer security policies and procedures for sites that have systems on the Internet. Published 1997. http://tools.ietf.org/html/rfc2196 » Return on Information Security Investment
Assess your company's Return on Information Security Investment http://www.adrianmizzi.com » SANS InfoSec Reading Room
Articles on security policy and other information security topics. http://www.sans.org/rr/ » SecureZone
Information portal with focus on policies, protocols and standards http://www.securezone.com » SecurityDocs
A substantial collection of papers and articles on the development and implementation of security policies. http://www.securitydocs.com/Security_Policies » The Basics of an IT Security Policy
This paper is intended to address the importance of having a written and enforceable Information Technology (IT) security policy, and to provide an overview of the necessary components of an effective policy. http://www.giac.org/practical/jack_albright_gsec.doc » The Information Security Forum
It has produced the standard to provide guidelines on all aspects of information security including IT, data, and computer controls. http://www.isfsecuritystandard.com » U.S. Department of Health and Human Services
Security standards, transactions and code set standards, identifier standards, mailing lists, implementation guides, and administrative simplification. http://www.cms.hhs.gov/InformationSecurity/ » Understanding the Virus Threat and Developing Effective Anti-Virus Policy
This paper focuses on providing the reader with an overview of the current virus landscape and aids in developing best practice anti-virus policies. http://www.sans.org/rr/papers/index.php?id=135 » What makes a good security policy and why is one necessary?
Security does not come from automated applications, rather it is compromised of security applications or systems, processes and procedures and the personnel to implement both the systems and processes. In order to properly address security, the most funda http://www.giac.org/practical/Caroline_Reyes_GSEC.doc » What's Your Policy?
Provides an article to discuss and explain the need for a comprehensive security policy, and some pointers to useful resources. http://windowsitpro.com/article/articleid/9764/whats-your-policy.html » Windows 2000 Group Policy and Security
The use of Group Policy to simplify the network security tasks that you face as a network administrator. With Group Policy, you can ensure that the machines on your network remain in a secure configuration after you deploy them. http://windowsitpro.com/article/articleid/9169/group-policy-and-security.html Category Editor: bushguy
Last Updated: 2008-02-12 18:20:15
The content of this directory is based on the Open Directory and has been modified by GoSearchFor.com |