Web Directory

  Policy (155)

Submit a Featured Link: [$19.00] Submit a Regular Link: [$9.00]  

Nomoz Sub Categories

Regular Websites in this category

U.S. Department of Health and Human Services Open in a new windowLink Details
- Security standards, transactions and code set standards, identifier standards, mailing lists, implementation guides, and administrative simplification.
- http://www.cms.hhs.gov/InformationSecurity/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
IASEP Data Security Protocol Open in a new windowLink Details
- An archive website from the Purdue Research Foundation, containing a range of example security policy sets.
- http://arc.education.purdue.edu/protocol/home_page.htm

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
RFC2196 (Site Security Handbook) Open in a new windowLink Details
- a guide to developing computer security policies and procedures for sites that have systems on the Internet. Published 1997.
- http://tools.ietf.org/html/rfc2196

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Common Criteria Evaluation and Validation Scheme Open in a new windowLink Details
- Provides details of this US government scheme.
- http://www.niap-ccevs.org/cc-scheme/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Windows 2000 Group Policy and Security Open in a new windowLink Details
- The use of Group Policy to simplify the network security tasks that you face as a network administrator. With Group Policy, you can ensure that the machines on your network remain in a secure configuration after you deploy them.
- http://www.windowsitpro.com/Article/ArticleID/9169/9169.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
What's Your Policy? Open in a new windowLink Details
- If your company doesn't have written security policies, it's time it did, and Mark Edwards has some resources to help.
- http://www.windowsitpro.com/Article/ArticleID/9764/9764.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecureZone Open in a new windowLink Details
- Information portal with focus on policies, protocols and standards
- http://www.securezone.com

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Windows IT LIbrary Open in a new windowLink Details
- This paper offers wide ranging advice on the development and implementation of security policies.
- http://www.windowsitlibrary.com/Content/121/07/1.html?Ad=1&

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
CobiT User Group Open in a new windowLink Details
- International user group and hub for CobiT, the emerging IT control and security methodology.
- http://www.controlit.org

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecurityDocs Open in a new windowLink Details
- A substantial collection of papers and articles on the development and implementation of security policies.
- http://www.securitydocs.com/Security_Policies

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Network Security - Internet Security for the Enterprise Open in a new windowLink Details
- Information hub for the enterprise discussing network security, storage compliance, CRM, and human resource.
- http://www.infotechlive.com

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
AmiWall.org Open in a new windowLink Details
- Proxy based system to aid in implementing employee internet use policies.
- http://www.amiwall.org/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Understanding the Virus Threat and Developing Effective Anti-Virus Policy Open in a new windowLink Details
- This paper focuses on providing the reader with an overview of the current virus landscape and aids in developing best practice anti-virus policies.
- http://www.sans.org/rr/papers/index.php?id=135

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Why Security Policies Fail Open in a new windowLink Details
- Objective analysis reveals that many breaches are linked to common weaknesses in the security policy...accidents waiting to happen. This article focuses on strategic and systematic weaknesses that can slowly degrade security operations.
- http://downloads.securityfocus.com/library/Why_Security_Policies_Fail.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
An Overview of Corporate Computer User Policy Open in a new windowLink Details
- Article discusses the elements of a corporate security policy, which it calls the gateway to a company`s intellectual property. The main threat to information security within a company is its employees.
- http://www.sans.org/rr/papers/50/535.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SANS InfoSec Reading Room Open in a new windowLink Details
- Articles on security policy and other information security topics.
- http://www.sans.org/rr/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Information Security Policies Open in a new windowLink Details
- Make and manage security policies. Run awareness programs with audits and e-learning to build a human firewall.
- http://www.neupart.com

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
OSSTMM: Open Source Security Testing Methodology Manual Open in a new windowLink Details
- A widely used, peer-reviewed, comprehensive methodology for performing security tests.
- http://www.isecom.org/projects/osstmm.shtml

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Canada's Export Controls Open in a new windowLink Details
- Unofficial / unverified article describing Canada's export controls on cryptographic software.
- http://www.efc.ca/pages/doc/crypto-export.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Institute for Security and Open Methodologies (ISECOM) Open in a new windowLink Details
- Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing.
- http://www.isecom.org

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Acceptable Use Policy Report Open in a new windowLink Details
- A report on Acceptable Usage Policy: what corporations expect of it, a case study, and a framework for creating your own policy.
- http://members.iinet.net.au/~colinwee/mbt/acceptableuse/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
GASSP Home Page Open in a new windowLink Details
- Generally Accepted System Security Principles, developed by The International Information Security Foundation.
- http://web.mit.edu/security/www/gassp1.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
The Basics of an IT Security Policy Open in a new windowLink Details
- This paper is intended to address the importance of having a written and enforceable Information Technology (IT) security policy, and to provide an overview of the necessary components of an effective policy.
- http://www.giac.org/practical/jack_albright_gsec.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
How to Develop Good Security Policies and Tips on Assessment and Enforcement Open in a new windowLink Details
- [Word Document] Invest the time up front to carefully develop sound policies and then identify ways to gauge their effectiveness and assess the level of compliance within your organization. Commit to spending the time and resources required to ensure tha
- http://www.giac.org/practical/Kerry_McConnell_GSEC.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Formulating a Wireless LAN Security Policy: Relevant Issues, Considerations and Implications Open in a new windowLink Details
- [Word Document] This paper represents the security issues related to the use of wireless (vs wired) LAN technology and recommends a number of key implementation guidelines to ensure the secure deployment of wireless LAN services in the company.
- http://www.giac.org/practical/David_Quay_GSEC.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
What makes a good security policy and why is one necessary? Open in a new windowLink Details
- Security does not come from automated applications, rather it is compromised of security applications or systems, processes and procedures and the personnel to implement both the systems and processes. In order to properly address security, the most fund
- http://www.giac.org/practical/Caroline_Reyes_GSEC.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
The Information Security Forum Open in a new windowLink Details
- It has produced the standard to provide guidelines on all aspects of information security including IT, data, and computer controls.
- http://www.isfsecuritystandard.com

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Browsing with a Loaded Gun Open in a new windowLink Details
- A strong web Security Policy is key to keeping your company safe in the net-centric world. (PDF format)
- http://www.pentasafe.com/whitepapers/LoadedGun.PDF

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
ITworld.com - Security's human side Open in a new windowLink Details
- IT World article - essentially a review of Pentasafe's VigilEnt security policy management product.
- http://www.itworld.com/Man/3903/IWD010529securityshuman/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Best Practices in Network Security Open in a new windowLink Details
- Knowing how and what to protect and what controls to put in place is difficult. It takes security management, including planning, policy development and the design of procedures.
- http://enterprisesecurity.symantec.com/article.cfm?articleid=42&PID=372347

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Site Security Policy Development Open in a new windowLink Details
- This paper outlines some issues that the writer of a Site Computer Security Policy may need to consider when formulating such a document.
- http://secinf.net/info/policy/AusCERT.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
P3P Guiding Principles Open in a new windowLink Details
- Principles behind the W3C Platform for Privacy Preferences initiative.
- http://www.w3.org/TR/NOTE-P3P10-principles

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Do you have an intrusion detection response plan? Open in a new windowLink Details
- Discussion of what should go into the creation of an intrusion detection plan and the expected results.
- http://www.nwfusion.com/newsletters/sec/0913sec1.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Structured Approach to Computer Security Open in a new windowLink Details
- A security policy is a set of rules written in general terms stating what is permitted and what is not permitted in a system during normal operation.
- http://www.ce.chalmers.se/staff/ulfl/pubs/tr122to.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Information Security Program Development Open in a new windowLink Details
- Security standards are needed by organizations because of the amount of information, the value of the information, and ease with which the information can be manipulated or moved.
- http://www.blackmagic.com/ses/bruceg/progmgt.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Make Your Web Site P3P Compliant Open in a new windowLink Details
- How to create and publish your company's platform for privacy performance policy, a W3C initiative, in 6 steps.
- http://www.w3.org/P3P/details.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Policy Over Policing Open in a new windowLink Details
- InfoWorld article - It's easy to develop e-mail and Internet policies, but education and documentation are crucial to their success.
- http://archive.infoworld.com/cgi-bin/displayArchive.pl?/96/34/e01-34.55.htm

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Internet/Network Security Policy Development Open in a new windowLink Details
- How to write an effective network security policy. This is Part 4 of a 5 part tutorial on Internet and network security.
- http://netsecurity.about.com/compute/netsecurity/library/weekly/aa080299.htm?iam=mt

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
IT Security Cookbook Open in a new windowLink Details
- An excellent guide to computer & network security with a strong focus on writing and implementing security policy. This is primarily for security managers and system administrators.
- http://www.boran.com/security/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Computer and Information Security Policy Open in a new windowLink Details
- Formal IT security policy helps establish standards for IT resource protection by assigning program management responsibilities and providing basic rules, guidelines, and definitions for everyone in the organization. Policy thus helps prevent inconsisten
- http://secinf.net/info/policy/hk_polic.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Building Effective, Tailored Information Security Policy Open in a new windowLink Details
- 20th NISSC Internet Technical Security Policy Panel
- http://csrc.nist.gov/nissc/1997/panels/isptg/pescatore/html/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing

Submit a Featured Link: [$19.00]  Submit a Regular Link: [$9.00]