New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 20)
· Marcia's (QA2)
· Bill G's (CO9)
· Paul's (AR 5)
· Robin's (AR 1)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 566
Comments: 14
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image



[ Links Main | Add Link | New | Popular | Top Rated | Random ]

Category: Main/Security Policies


Sort Links by: Title (A\D) Date (A\D) Rating (A\D) Popularity (A\D)
Sites currently sorted by: Title (A to Z)


Center for Information Technology Security Policies, Guidelines, and Regulations 
Description: Contains links for:

  • NIH IT Security Policies

  • NIH IT Security Guidelines

  • Federal Regulations


Added on: 23-Feb-2002 Hits: 266
Rate this Site | Report Broken Link

E-mail and Executable Content Security Guides 
Description:
  • E-mail Security in the Wake of Recent Malicious Code Incidents
  • Guide to the Secure Configuration and Administration of Microsoft Exchange
  • Microsoft Office 97 Executable Content Security Risks and Countermeasures

Added on: 23-Feb-2002 Hits: 215
Rate this Site | Report Broken Link

IETF Site Security Handbook 
Description: This handbook is a guide to developing computer security policies and procedures for sites that have systems on the Internet. The purpose of this handbook is to provide practical guidance to administrators trying to secure their information and services. The subjects covered include policy content and formation, a broad range of technical system and network security topics, and security incident response.
Added on: 23-Feb-2002 Hits: 201
Rate this Site | Report Broken Link

INFORMATION TECHNOLOGY SECURITY POLICY 
Description: Murdoch University acknowledges an obligation to ensure appropriate security for all Information Technology data, equipment, and processes in its domain of ownership and control. This obligation is shared, to varying degrees, by every member of the university.

This document will:
  • Enumerate the elements that constitute IT security.

  • Explain the need for IT security.

  • Specify the various categories of IT data, equipment, and processes subject to this policy.

  • Indicate, in broad terms, the IT security responsibilities of the various roles in which each member of the university may function.

  • Indicate appropriate levels of security through standards and guidelines.

Added on: 23-Feb-2002 Hits: 224
Rate this Site | Report Broken Link

Introduction to Security Policies, Part 1: An Overview of Policies 
Description: This is the first in a series of four articles devoted to discussing about how information security policies can be used as an active part of an organization's efforts to protect its valuable information assets. In a world that is essentially technology driven; where the latest IIS exploit is countered with a mad rush to install the relevant patch and where the number of different operating systems in a network exceeds the number of hairs on the security administrator's head that haven't turned gray, policies give us an opportunity to change the pace, slow things down and play the game on our own terms. Policies allow organizations to set practices and procedures in place that will reduce the likelihood of an attack or an incident and will minimize the damage caused that such an incident can cause, should one occur.

Many people see policies as an afterthought; a tasty dressing to be added to a veritable technology-salad of firewalls, virus scanners and VPNs, all lightly sprinkled with just a touch of IDS. This is wrong. In this series I'll attempt to explain why policies should be the basis of a comprehensive Information Security strategy, and how policies can be an effective, practical part of your digital defense systems.

Added on: 23-Feb-2002 Hits: 242
Rate this Site | Report Broken Link

Introduction to Security Policies, Part 2: Creating a Supportive Environment 
Description: As we concluded the first article of this series, we pointed out that policies in themselves are ineffective; their effectiveness is directly proportional to the support they receive from the organization. Thus it is crucial that the organization be aware of the importance of security policies and create an environment in which security is given a high priority. The bigger the organization, the more important this support becomes. This article will go over a few of things that can be done to ensure that security policies given the full support of the management of the organization, which will thereby increase the efficacy of the policies.
Added on: 23-Feb-2002 Hits: 220
Rate this Site | Report Broken Link

Introduction to Security Policies, Part 3: Structuring Security Policies 
Description: This is the third in a four-part overview of security policies. In the first article, we looked at what policies are and what they can achieve. In the second article, we looked at the organizational support required to implement security policies successfully. In this installment, we shall discuss how to develop and structure a security policy.
Added on: 23-Feb-2002 Hits: 205
Rate this Site | Report Broken Link

Introduction to Security Policies, Part 4: A Sample Policy 
Description: This is the fourth in a four-part overview of security policies. In the first article, we looked at what policies are and what they can achieve. The second article looked at the organizational support required to implement security policies successfully. The third installment discussed how to develop and structure a security policy. This installment will take a look at a few examples of security policies.
Added on: 18-Sep-2003 Hits: 127
Rate this Site | Report Broken Link

JOS Orange Book Security Requirements 
Description: This document outlines Orange Book security requirements as defined under the US National Computer Security Center's Technical Guidelines Program publication, Department of Defense Trusted Computer System Evaluation Criteria and how they apply to JOS. It focuses on secrecy and has limited applicability to the principles of accuracy, availability and authenticity.
Added on: 23-Feb-2002 Hits: 183
Rate this Site | Report Broken Link

RUsecure Information Security Policies 
Description: The RUsecure policies are of the highest standard - and they are fully compliant with the international security standard, ISO17799!
Added on: 23-Feb-2002 Hits: 127
Rate this Site | Report Broken Link



Select Page: 1 2   [ Next Page >> ]
Login
User Login

Nickname:
Password:
Security Code: Security Code
Type Security Code:
 
· New User? ·
Click here to create a registered account.
image
Forums Topics
Syndication