Search for
Home > Computers > Security >

Policy
New! Submit a site
 
whatUseek Directory Site Listings:
 
Para-Protect's Para-Policy - Policy is the foundation for a strong and consistent security program. Policy is the often over-looked component of all good corporate information security programs.
 
Policies and Procedures - A presentation from the SANS institute course "Building an Effective Security Infrastructure", which outlines the elements to be included when designing a corporate security policy. Also available for download in Power Point format.
 
Policy Manager - Cisco Systems - Cisco Secure Policy Manager is a scalable, powerful security policy management system for Cisco firewalls and Virtual Private Network (VPN) gateways. Assistance is also provided with the development and audititing of security policy.
 
Policy Over Policing - It's easy to develop e-mail and Internet policies, but education and documentation are crucial to their success.
 
Policy Standards and IETF Terminology - The goal of this series of papers is to present the elements of Policy-based Network Management (PBNM) and Quality of Service (QoS) in an organized and thorough manner.
 
RFC2196 (Site Security Handbook) - a guide to developing computer security policies and procedures for sites that have systems on the Internet.
 
Realizing Computer Security: If Not Now, When? - Security is increasingly recognized as a necessity in today's highly competitive environment. The trouble is that in practice, corporate security policies too often pay only lip service to protecting data assets.
 
Sandstorm Modem Policy - This policy is designed to be an addition to an existing corporate security policy. It can be an addition to a Remote Access Policy, if one exists, or to simply stand alone as a Modem Access policy if no current policy of this sort exists at the Company.
 
Security Awareness Are Your Users "clued in" or "clueless"? - A sound security policy is the foundation of any successful security program. The policy defines the organizations overall posture toward security.
 
Security Framework and Principles - The section of the Workstation Support Services Security Framework and Principles document from the University of California, Berkley.
 
Security Information Web Site - Content rich ready for publication security information web site enables companies to JUMP-START their security management program with policies, plans, techniques, and countermeasures
 
Security Planning - This paper provides guidelines for developing security policies and implementing controls to prevent computer risks from becoming reality.
 
Shelfware: How to Avoid Writing Security Policy and Documentation That Doesnt Work - This paper explores the "GIAC Basic Security Policy" material (Part V of the course), looking into pitfalls that can make security policy and similar documentation unwieldy and unreadable.
 
Site Security Policy Development - Article by Rob McMillan outlining the importance and characteristics of a good security policy. This article is slightly dated, but provides a good starting point.
 
Site Security Policy Development - Article by Rob McMillan outlining the importance and characteristics of a good security policy. This article is slightly dated, but provides a good starting point.
 
Steps to a Secure Network - The typical corporate security objective of the past has been to protect the Enterprise network from the Internet, but as we are reading in the news today, this has not been enough. The first step in protecting the Enterprise is to set realistic expectations.
 
Structured Approach to Computer Security - A security policy is a set of rules written in general terms stating what is permitted and what is not permitted in a system during normal operation.
 
Sun Tzu and the Art of (Cyber) War: Ancient Advice for Developing an Information Security Program - Though the battles fought are quite different from ancient China, Sun Tzus philosophies can aid when setting up a security program at your company.
 
The Information Security Forum - The Forum's Standard of Good Practice for Information Security - The Information Security Forum has produced the Standard to provide guidelines on all aspects of information security including, IT, Data and Computer controls.
 
Toward Standardization of Information Security: BS 7799 - This paper describes BS 7799, the "Code of Practice for Information Security Management" as an information security management system, identifies the industry movement toward BS 7799 certification, reports the current effort involving the transformation of BS 7799 into ISO 17799 and suggests a need for the information security professional to familiar with BS 7799.
 
 

[ 1 2 3 4 5 ]
Help build the largest human-edited directory on the web.
  Submit a Site - Open Directory Project - Become an Editor  
About   Help   Content Filter   Terms   Privacy Policy

© 2018 whatUseek