Website Information
    Web Site Information :.   Site Info    Whois    Traceroute    RBL Check  

Enter Web Site URL Address:
 

Top / Computers / Security / Policy /

Formulating a Wireless LAN Security Policy: Relevant Issues, Considerations and Implications
[Word Document] This paper represents the security issues related to the use of wireless (vs wired) LAN technology and recommends a number of key implementation guidelines to ensure the secure deployment of wireless LAN services in the company.
http://www.giac.org/practical/David_Quay_GSEC.doc
Giac.org  ~   Site Info   Whois   Trace Route   RBL Check  
How to Develop Good Security Policies and Tips on Assessment and Enforcement
[Word Document] Invest the time up front to carefully develop sound policies and then identify ways to gauge their effectiveness and assess the level of compliance within your organization. Commit to spending the time and resources required to ensure th
http://www.giac.org/practical/Kerry_McConnell_GSEC.doc
Giac.org  ~   Site Info   Whois   Trace Route   RBL Check  
The Basics of an IT Security Policy
This paper is intended to address the importance of having a written and enforceable Information Technology (IT) security policy, and to provide an overview of the necessary components of an effective policy.
http://www.giac.org/practical/jack_albright_gsec.doc
Giac.org  ~   Site Info   Whois   Trace Route   RBL Check  
Acceptable Use Policy Report
A report on Acceptable Usage Policy: what corporations expect of it, a case study, and a framework for creating your own policy.
http://members.iinet.net.au/~colinwee/mbt/acceptableuse/
Iinet.net.au  ~   Site Info   Whois   Trace Route   RBL Check  
Institute for Security and Open Methodologies (ISECOM)
Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing.
http://www.isecom.org
Isecom.org  ~   Site Info   Whois   Trace Route   RBL Check  
Canada's Export Controls
Unofficial / unverified article describing Canada's export controls on cryptographic software.
http://www.efc.ca/pages/doc/crypto-export.html
Efc.ca  ~   Site Info   Whois   Trace Route   RBL Check  
OSSTMM: Open Source Security Testing Methodology Manual
A widely used, peer-reviewed, methodology for performing security tests.
http://www.isecom.org/projects/osstmm.shtml
Isecom.org  ~   Site Info   Whois   Trace Route   RBL Check  
Information Security Policies
Make and manage security policies. Run awareness programs with audits and e-learning to build a human firewall.
http://www.neupart.com
Neupart.com  ~   Site Info   Whois   Trace Route   RBL Check  
SANS InfoSec Reading Room
Articles on security policy and other information security topics.
http://www.sans.org/rr/
Sans.org  ~   Site Info   Whois   Trace Route   RBL Check  
An Overview of Corporate Computer User Policy
Article discusses the elements of a corporate security policy, which it calls the gateway to a company`s intellectual property. The main threat to information security within a company is its employees.
http://www.sans.org/rr/papers/50/535.pdf
Sans.org  ~   Site Info   Whois   Trace Route   RBL Check  
 


Page 2/5« Previous12345Next »
  IP Index    TLD Index    Domain Index    Site Index New   Copyright © 2025 Cybernet Quest.