Search for
Home > Computers > Security >

Policy
New! Submit a site
 
whatUseek Directory Site Listings:
 
Computer and Information Security Policy - Formal IT security policy helps establish standards for IT resource protection by assigning program management responsibilities and providing basic rules, guidelines, and definitions for everyone in the organization. Policy thus helps prevent inconsistencies that can introduce risks, and policy serves as a basis for the enforcement of more detailed rules and procedures.
 
Computing Policies - The electronic resource usage and security policy for the University of Pennsylvania.
 
Considerations for an Acceptable Use Policy for a Commercial Enterprise - Computer security policies are the high cover that allow the computer security professional to effectively operate in an enterprise where the ultimate goal is to produce a product at a cost that allows the company to successfully compete in the marketplace.
 
Create Order with a Strong Policy - A well-written, well-run security policy keeps cracks from appearing in your network's foundation.
 
Creating Security Policies Lessons Learned - After attending SANS training or other security classes we return to work with an eagerness to move forward with hardening servers, tightening firewalls, and implementing intrusion detection systems. This paper shows the reader some steps we have taken on our continuing journey towards a full set of security policies and procedures.
 
Developing a Computer Security Proposal for Small Businesses - How to Start - It has been widely reported that computerization has played a significant role in the current economic expansion. However, when it comes to systems management in general, and systems security in particular, small businesses are ill prepared to deal with the challenges that increased automation and increased connectivity bring.
 
Do you have an intrusion detection response plan? - Discussion of what should go into the creation of an intrusion detection plan and the expected results.
 
E-Policy - E-policy is a corporate statement and set-of-rules to protect the organisation from casual or intentional abuse that could result in the release of sensitive information, IT system failures or litigation against the organisation by employees or other parties.
 
Effective Security Policies Require Frequent Reviews - Companies have the best intentions when drafting their initial IT security policies. The problem is that once written, most policies collect dust.
 
Email Policy.com - Learn how to create a company e-mail policy and enforce it using email security software. Also lists sample email policies, books and links.
 
Embrace your Policies - Discussion of the importance of security policy acceptance to overall security.
 
Enhancing Enterprise Security - This is a solid site with a good overview of all factors which should go into to the design of a security policy.
 
Enterprise Security Management (ESM): Centralizing Management of Your Security Policy - This paper will define Enterprise Security Management (ESM). It will discuss motivations for implementing ESM. It will also look at security policy development and overview some of the items that security policy should contain.
 
Firewalls and Internet Security - Good paper with theory and firewalls description. Network security policy example.
 
Generalizing Ethics in an Information-based Society - Part 1 of a series of articles on the problems faced when attempting to include a code of ethics in a computer security policy.
 
Group Policy and Security - The use of Group Policy to simplify the network security tasks that you face as a network administrator. With Group Policy, you can ensure that the machines on your network remain in a secure configuration after you deploy them.
 
HIPAA Security Policy Development: A Collaborative Approach - The Health Insurance Portability and Accountability Act of 1996 (HIPAA), enacted on August 21, 1996 as Public Law 104-191, authorized the Secretary of Health and Human Services (HHS) to develop security standards to prevent inadvertent or intentional unauthorized use or disclosure of any health information that is electronically maintained or used in an electronic transmission.
 
Herding Cats 101: Development & Implementation of Security Policies at a University - The widely-publicized denial of service attacks of February 2000 showcase the need for a basic security policy which governs and oversees the type of activities that are allowed on university computing and network resources.
 
How Does the Code of Ethics Relate to Security? - Part 2 of this series of including ethics in security policy writing provides examples of the broad range of potential situations which may be faced by system/security administrators.
 
How to Develop Your Companys First Security Baseline Standard - The goal of this document is to provide a guide for those charged with designing and implementing baseline security standards for the first time.
 
 

[ 1 2 3 4 5 ]
Help build the largest human-edited directory on the web.
  Submit a Site - Open Directory Project - Become an Editor  
About   Help   Content Filter   Terms   Privacy Policy

© 2018 whatUseek