|
Donations |
|
|
|
|
|
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
|
|
|
Survey |
|
|
|
|
|
|
|
|
Translate |
|
|
|
|
|
|
|
|
|
|
Category: Main/Security Policies
Sort Links by: Title (A\D) Date (A\D) Rating (A\D) Popularity (A\D)
Sites currently sorted by: Title (A to Z)
Center for Information Technology Security Policies, Guidelines, and Regulations
Description: Contains links for:
- NIH IT Security Policies
- NIH IT Security Guidelines
- Federal Regulations
Added on: 23-Feb-2002 Hits: 266
Rate this Site | Report Broken Link
E-mail and Executable Content Security Guides
Description:
- E-mail Security in the Wake of Recent Malicious Code Incidents
- Guide to the Secure Configuration and Administration of Microsoft Exchange
- Microsoft Office 97 Executable Content Security Risks and Countermeasures
Added on: 23-Feb-2002 Hits: 215
Rate this Site | Report Broken Link
IETF Site Security Handbook
Description: This handbook is a guide to developing computer security policies and procedures for sites that have systems on the Internet. The purpose of this handbook is to provide practical guidance to administrators trying to secure their information and services. The subjects covered include policy content and formation, a broad range of technical system and network security topics, and security incident response.
Added on: 23-Feb-2002 Hits: 201
Rate this Site | Report Broken Link
INFORMATION TECHNOLOGY SECURITY POLICY
Description: Murdoch University acknowledges an obligation to ensure appropriate security for all Information Technology data, equipment, and processes in its domain of ownership and control. This obligation is shared, to varying degrees, by every member of the university.
This document will:
- Enumerate the elements that constitute IT security.
- Explain the need for IT security.
- Specify the various categories of IT data, equipment, and processes subject to this policy.
- Indicate, in broad terms, the IT security responsibilities of the various roles in which each member of the university may function.
- Indicate appropriate levels of security through standards and guidelines.
Added on: 23-Feb-2002 Hits: 224
Rate this Site | Report Broken Link
Introduction to Security Policies, Part 1: An Overview of Policies
Description: This is the first in a series of four articles devoted to discussing about how information security policies can be used as an active part of an organization's efforts to protect its valuable information assets. In a world that is essentially technology driven; where the latest IIS exploit is countered with a mad rush to install the relevant patch and where the number of different operating systems in a network exceeds the number of hairs on the security administrator's head that haven't turned gray, policies give us an opportunity to change the pace, slow things down and play the game on our own terms. Policies allow organizations to set practices and procedures in place that will reduce the likelihood of an attack or an incident and will minimize the damage caused that such an incident can cause, should one occur.
Many people see policies as an afterthought; a tasty dressing to be added to a veritable technology-salad of firewalls, virus scanners and VPNs, all lightly sprinkled with just a touch of IDS. This is wrong. In this series I'll attempt to explain why policies should be the basis of a comprehensive Information Security strategy, and how policies can be an effective, practical part of your digital defense systems.
Added on: 23-Feb-2002 Hits: 242
Rate this Site | Report Broken Link
Introduction to Security Policies, Part 2: Creating a Supportive Environment
Description: As we concluded the first article of this series, we pointed out that policies in themselves are ineffective; their effectiveness is directly proportional to the support they receive from the organization. Thus it is crucial that the organization be aware of the importance of security policies and create an environment in which security is given a high priority. The bigger the organization, the more important this support becomes. This article will go over a few of things that can be done to ensure that security policies given the full support of the management of the organization, which will thereby increase the efficacy of the policies.
Added on: 23-Feb-2002 Hits: 220
Rate this Site | Report Broken Link
Introduction to Security Policies, Part 3: Structuring Security Policies
Description: This is the third in a four-part overview of security policies. In the first article, we looked at what policies are and what they can achieve. In the second article, we looked at the organizational support required to implement security policies successfully. In this installment, we shall discuss how to develop and structure a security policy.
Added on: 23-Feb-2002 Hits: 205
Rate this Site | Report Broken Link
Introduction to Security Policies, Part 4: A Sample Policy
Description: This is the fourth in a four-part overview of security policies. In the first article, we looked at what policies are and what they can achieve. The second article looked at the organizational support required to implement security policies successfully. The third installment discussed how to develop and structure a security policy. This installment will take a look at a few examples of security policies.
Added on: 18-Sep-2003 Hits: 127
Rate this Site | Report Broken Link
JOS Orange Book Security Requirements
Description: This document outlines Orange Book security requirements as defined under the US National Computer Security Center's Technical Guidelines Program publication, Department of Defense Trusted Computer System Evaluation Criteria and how they apply to JOS. It focuses on secrecy and has limited applicability to the principles of accuracy, availability and authenticity.
Added on: 23-Feb-2002 Hits: 183
Rate this Site | Report Broken Link
RUsecure Information Security Policies
Description: The RUsecure policies are of the highest standard - and they are fully compliant with the international security standard, ISO17799!
Added on: 23-Feb-2002 Hits: 127
Rate this Site | Report Broken Link
Select Page: 1 2 [ Next Page >> ]
|
|
|
|
|
|
Login |
|
|
|
|
|
· New User? ·
Click here to create a registered account.
|
|
|
Forums Topics |
|
|
|
|
|
Syndication
|
|