Search for
Home > Computers > Security >

Policy
New! Submit a site
 
whatUseek Collection Sites (submit a site ):
 
Callio Technologies - BS 7799 / ISO 17799 - Callio Technologies specializes in the field of computer security. Callio Secura 17799, is software that helps companies comply with the BS 7799 / ISO 17799 information security standard.
 
 

whatUseek Directory Site Listings:
 
A Framework for Establishing Internet Usage Policies - A series of questions and answers on the use of a Framwork to implement Internet Usage Policies.
 
A Pragmatic Approach to Implementing a Corporate Security Policy - By focusing on a company's Security Policy, the InfoSec professional can finally begin to have a meaningful impact on the actual fabric of everyday business activities within an Information Security context.
 
A Security Policy is a 'Live' Issue - A good security policy is paramount in protecting your company assets, but it must cater for everyone from the accountant to the software engineer and must be kept up-to-date.
 
A System Security Policy for You - The purpose of this document is to meet the requirements of the GIAC Security Essentials assignment and to provide other interested parties with a reference document that they can use to get their System Security Policy (SSP) document started.
 
Acceptable Use Policy - While there are many categories of security policy and each is important, some are conceivably more critical as they provide the foundation for many other sections of the policy. Perhaps no category does more to provide that foundation than that of acceptable use.
 
Acceptable Use Policy - While there are many categories of security policy and each is important, some are conceivably more critical as they provide the foundation for many other sections of the policy. Perhaps no category does more to provide that foundation than that of acceptable use.
 
Applying IT Security Policies & Computer Security Standards - Security policies and computer security standards must be implemented to be effective. This site introduces an approach to easing the problem of organization wide implementation.
 
BS 7799 Security Standard & Compliance - BS 7799, first published in February 1995, is a comprehensive set of controls comprising best practices in information security. BS 7799 is intended to serve as a single reference point for identifying a range of controls needed for most situations where information systems are used in industry and commerce, and to be used by large, medium and small organizations. It was significantly revised and improved in May 1999.
 
BS7799 Security Standard: Compliance & Positioning - What it is and how to achieve BS7799 compliance - a starting point.
 
Baseline Software, Inc. - Information Security Policies Made Easy by Charles Cresson Wood, CISA, CISSP, noted international information security consultant and researcher.
 
Best Practices in Network Security - Knowing how and what to protect and what controls to put in place is difficult. It takes security management, including planning, policy development and the design of procedures.
 
Browsing with a Loaded Gun - A strong web Security Policy is key to keeping your company safe in the net-centric world. (PDF format)
 
Building Effective, Tailored Information Security Policy - 20th NISSC Internet Technical Security Policy Panel
 
CERT Practice Modules: Improving Security - Determine contractor ability to comply with your organization's security policy.
 
CERT Practice Modules: Responding to Intrusions - Establish policies and procedures for responding to intrusions.
 
CERT Practice Modules: Securing Desktop Workstations - Develop and promulgate an acceptable use policy for workstations.
 
Central Policy Mediation for Information Sharing - Most existing methods of information sharing rely on application and operating system features to provide security. The format of this list and its policy capabilities are different for each platform. A complete solution for secure information sharing requires a method of uniformly creating and enforcing information security policies across an enterprise network.
 
Computer Policies for Employee Handbooks - Proven, affordable, ready made computer security and usage policies covering areas such as email, internet, virus, unauthorized changes, personal use, remote access and laptop precautions.
 
Computer Policy Guide - A commercial manual with sample policies. Topics include: Email; Internet Usage; Personal Computer Usage; Information Security; and Document Retention.
 
 

[ 1 2 3 4 5 ]
Help build the largest human-edited directory on the web.
  Submit a Site - Open Directory Project - Become an Editor  
About   Help   Content Filter   Terms   Privacy Policy

© 2018 whatUseek