Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Information security


Related Topics

  
 [No title]   (Site not responding. Last check: 2007-07-20)
The senior information resource managers and security program managers that we met also generally agreed that OIRA had done a good job of developing and communicating guidance regarding information security and responding to their individual requests for clarification of guidance.
Examiners for all but one agency said that they considered information security during their examination of agency budgets and programs to some extent, although examiners for eight agencies said that they only did so when it had been highlighted by agency management or in audit reports as a problem.
Implementing effective information security programs is primarily the responsibility of managers at individual federal agencies, since they are the most familiar with program risks and they have the ability to bring resources to bear where they will be most effective.
www.loyola.edu /dept/politics/intel/aimd-96-110.html   (11853 words)

  
 Information Security Policies & Computer Security Policy Directory
The relationship between information security policies and risk analysis is by their very nature complex.
When embracing security policies, it is important consider their objectives, scope, and coverage.
Because of this, and because of the standards relevance as a common currency for information security measurement, many organizations are basing their security policies upon the standard itself.
www.information-security-policies-and-standards.com   (872 words)

  
 Information Security
Given the threats the attacks pose to military operations and national security, GAO was asked to report on the extent to which Defense systems are being attacked, the potential for further damage to information and systems, and the challenges Defense faces in securing sensitive information.
DISA information also shows that attacks are successful 65 percent of the time, and that the number of attacks is doubling each year, as Internet use increases along with the sophistication of "hackers"\1 and their tools.
They also coordinate computer security with physical and personnel security, develop back-up and contingency plans, manage access to all information systems with sound password and user identification procedures, ensure that audit trails of log-ins to systems are maintained and analyzed, and perform a host of other duties necessary to secure the location's computer systems.
www.securitymanagement.com /library/000215.html   (11360 words)

  
 Microsoft Security Bulletin MS04-011: Security Update for Microsoft Windows (835732)   (Site not responding. Last check: 2007-07-20)
A Security Update Roll-up is typically used to combine previous releases into a single update to allow for easier installation and faster download.
When the bulletin was released on April 13, 2004, MBSA detection for this security update was disabled for Windows NT 4.0 because of the lack of detection support for the stand-alone version of NetMeeting that is described earlier in this bulletin.
Microsoft is therefore releasing a security update for Windows Server 2003 that corrects the buffer overrun while continuing to leave PCT disabled.
www.microsoft.com /technet/security/bulletin/MS04-011.mspx   (10145 words)

  
 FreeBSD Security Information
Security Officer PGP key to encrypt your messages to the Security Officer when appropriate.
As a general policy, the FreeBSD Security Officer favors full disclosure of vulnerability information after a reasonable delay to permit safe analysis and correction of a vulnerability, as well as appropriate testing of the correction, and appropriate coordination with other affected parties.
The Security Officer may bring additional FreeBSD developers or outside developers into discussion of a submitted security vulnerability if their expertise is required to fully understand or correct the problem.
www.freebsd.org /security   (1084 words)

  
 Oracle Information Security   (Site not responding. Last check: 2007-07-20)
Oracle delivers the secure infrastructure you trust to run your business with a wide range of products and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management.
Oracle Information Security solutions allow you to share information confidently, protect the integrity of your information, and help meet stringent regulatory compliance.
Oracle Information Architecture Services can help you develop and deploy a comprehensive and cost-effective overall strategy for maintaining information security.
www.oracle.com /solutions/security   (305 words)

  
 JHU Information Security Institute - Home   (Site not responding. Last check: 2007-07-20)
Securing cyberspace and our national information infrastructure is more critical now than ever before, and it can be achieved only when the core technology, legal and policy issues are adequately addressed.
RFID Encryption vulnerabilities are identified in a newly published paper entitled 'Security Analysis of a Cryptographically-Enabled RFID Device' by Steve Bono, Matthew Green, Adam Stubblefield, and Avi Rubin.
Numerous security flaws are identified in a newly published paper entitled 'Analysis of an Electronic Voting System' by Tadayoshi Kohno (JHU), Adam Stubblefield (JHU), Aviel Rubin (JHU), and Dan Wallach (Rice University).
www.jhuisi.jhu.edu   (614 words)

  
 The RUsecure Information Security Policies   (Site not responding. Last check: 2007-07-20)
Information security policies are the foundation, the bottom line, of information security within an organization.
The most direct method of delivering an information security policy set is via the users desktop.
SOS (Security Online Support) utilizes all these benefits and is designed specifically to ensure efficient delivery of security policies.
www.information-security-policies.com   (380 words)

  
 Computer Security Information   (Site not responding. Last check: 2007-07-20)
Information is organized by source and each section is organized by topic.
A number of groups from around the world provide information about security vulnerabilities and methods to remove or reduce the danger of particular vulnerabilities for different computer operating systems.
A number of computer security organizations exists that provide information to the public or to their members.
www.alw.nih.gov /Security/security.html   (311 words)

  
 Information Security Decisions 2005   (Site not responding. Last check: 2007-07-20)
But the face of security is changing to an even greater enterprise-wide concern not just for your IT department.
Information Security Decisions arms you with the expert advice it takes to tackle today’s mission-critical security objectives--no matter how rampant user ignorance or noncompliance runs throughout your organization.
Security is your business – showing you how to secure the future of that business is ours.
infosecurityconference.techtarget.com   (163 words)

  
 Information Security Glossary - The Information Security Policies Glossary   (Site not responding. Last check: 2007-07-20)
Welcome to the glossary of information security and computing terms and phrases.
This resource will hopefully prove to be useful in helping you to understand the jargon and terminology used within the information security industry and sector.
These words, phrases, expressions, acronyms, and abbreviations, are used in everyday conversation, as well as in various reference texts, and may well be encountered in conferences, seminars, broadcast and print media, and other situations.
www.yourwindow.to /information-security   (357 words)

  
 Welcome to Securadigm : Trusted Provider of IT Security Solutions, Managed Firewalls, Risk Assessment, Computer Network ...   (Site not responding. Last check: 2007-07-20)
The first steps to securing your information assets are to identify them and their value, and to evaluate your current security level from both business and technical perspectives.
Security is not an event; it's an ongoing process.
Much as we would like to give you a permanent solution, the fact is that your systems and applications and the world of technology they operate in are changing all the time.
www.securadigm.com   (156 words)

  
 Information Warfare on the Web
Information warfare: The term conjures up a vision of unseen enemies, armed only with laptop personal computers connected to the global computer network, launching untraceable electronic attacks against the United States.
Information warfare may be, for many, the hip topic of the moment, but a factually solid knowledge of it remains elusive.
Information warfare, also known as I-War, IW, C4I, or Cyberwar, has recently become of increasing importance to the military, the intelligence community, and the business world.
www.fas.org /irp/wwwinfo.html   (623 words)

  
 Security Leadership Conference Series - (ISC)2 Infosecurity Reed Exhibitions - Earn CPE credits - CISSP SSCP   (Site not responding. Last check: 2007-07-20)
Today, security is acknowledged as an integral component for corporate success.
This acknowledgment increases the demand for highly-skilled information security professionals.
The CISSP® and the SSCP® credentials identify you as an individual capable of developing and implementing solid information security practices and procedures, performing risk analysis, identifying necessary countermeasures and assisting your organization as a whole to protect its corporate infrastructure.
www.info-sec.com   (221 words)

  
 Information Security
We still lack conclusive scientific proof that any of the systems in widespread use are secure, and this motivates further work in the search for provably secure and practical cryptosystems.
The ready access to information through networks has the potential to change our society as fundamentally as the industrial revolution did over a century ago.
We are investigating the use of small processing devices as information security tools, including applications to key management and network security.
www.almaden.ibm.com /cs/k53/crypt.html   (580 words)

  
 Microsoft Security Antivirus Information
The second reward, in the amount of $250,000, is for information that results in the arrest and conviction of those responsible for launching the Sobig virus.
The third reward, in the amount of $250,000, is for information that results in the arrest and conviction of those responsible for launching the Mydoom.B worm.
Individuals with information about the MSBlast.A worm, the Sobig worm—or any other worms or viruses—should contact the FBI or the Secret Service through the online Internet Fraud Complaint Center or by calling their local FBI field office or the Interpol National Central Bureau in any of Interpol's 181 member countries.
www.microsoft.com /security/antivirus/default.mspx   (411 words)

  
 IBM Zurich Research Laboratory, Computer Science, Information Security, Portal page, Infosec   (Site not responding. Last check: 2007-07-20)
Information security, privacy and cryptography are cornerstones of the information society.
We work on the development of secure e-business protocols that aim at preventing intrusions from happening, as well as on tools and architectures for detecting intrusions in case they happen nevertheless.
The IBM Zurich Research Lab is a founding member of the Zurich Information Security Center (ZISC), a cooperation dedicated to fundamental and applied research in information security, led by the Swiss Federal Institute of Technology, Zurich.
www.zurich.ibm.com /csc/infosec   (300 words)

  
 Security Information
Security Sun Alerts contain the same type of information such as the impact of the issue, factors to help determine if one is at risk, related symptoms, workaround information and resolution details.
If Sun is not vulnerable to a reported security issue, a Security Sun Alert will not be issued, but a copy of Sun's vendor statement regarding the threat will be posted at Sun's Security Blog.
To report a security vulnerability or a potential security bug which could lead to a security advisory, send an email to security-alert@sun.com.
sunsolve.sun.com /pub-cgi/show.pl?target=security/sec   (306 words)

  
 Debian -- Security Information
Most security problems brought to our attention are corrected within 48 hours.
Debian also participates in security standardization efforts: the Debian Security Advisories are CVE-Compatible (review the cross references) and Debian is represented in the Board of the Open Vulnerability Assessment Language project.
For more information about security issues in Debian, please refer to the Security Team FAQ and a manual called Securing Debian.
security.debian.org   (290 words)

  
 DHS | Department of Homeland Security | Homeland Security Advisory System   (Site not responding. Last check: 2007-07-20)
Long-term, sustainable security measures tailored to the unique design of each region’s transit system are now in place throughout the mass transit sector.
The United States Government will continue to closely monitor and analyze threat information and share that information, together with guidance for protective measures, with state, local and private sector authorities as well as the general public as part of the sustained national effort to prevent terrorist attacks and protect our homeland.
Such information may include statistical reports, periodic summaries, incident response or reporting guidelines, common vulnerabilities and patches, and configuration standards or tools.
www.dhs.gov /dhspublic/display?theme=29   (548 words)

  
 Amazon.com: Books: Information Warfare & Security   (Site not responding. Last check: 2007-07-20)
Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary.
The author is clearly an expert in security and manages to touch upon all the major information security topics.
The writing is one of the most striking aspects of this book; right from the introduction the reader is taken on a logical and structured route through the key aspects of Information Security, with numerous references to real life cases.
www.amazon.com /exec/obidos/tg/detail/-/0201433036?v=glance   (1979 words)

  
 ISSA   (Site not responding. Last check: 2007-07-20)
This international web conference aims to provide the global community of information security professionals with an accessible platform to share and gather knowledge from the convenience of their own offices.
All ISSA members are requested to coordinate with their local chapter and submit nominations for the 2005 ISSA Awards.
Information about the specific award qualifications and the awards nomination process is located at: https://www.issa.org/cgi/issaopnpg.cgi?page=awardsguidelines.html
www.issa.org   (266 words)

  
 Federal Trade Commission - Consumer Information Security   (Site not responding. Last check: 2007-07-20)
Our access to information and entertainment; credit and financial services; products from every corner of the world – even to our work – is greater than earlier generations could ever have imagined.
security materials from other government agencies and non-profit organizations, including the National Cyber Security Alliance’s StaySafeOnline.info and the beta version of the Internet Education Foundation's GetNetWise.org security section.
Individuals, businesses and governments around the world all have a role in the “culture of security.” Check out the Organization for Economic Cooperation and Development’s Guidelines for the Security of Information Systems and Networks.
www.ftc.gov /bcp/conline/edcams/infosecurity   (430 words)

  
 Federation of American Scientists - America's War on Terrorism - Information Security   (Site not responding. Last check: 2007-07-20)
In response to concern about leaks of classified information, the White House moved to strictly limit disclosure of classified information to Congress.
White House Guidance on Safeguarding WMD Information and Sensitive Homeland Security Documents, memo from WH Chief of Staff Andrew Card, March 19, 2002.
Congress has admonished Members concerning their solemn obligation to protect classified information and warned that leaks are a sanctionable offense.
www.fas.org /terrorism/is   (442 words)

  
 ITtoolbox Blogs   (Site not responding. Last check: 2007-07-20)
About this Blog: Follow an Information Security Investigator as he recounts his unique experiences working with federal, corporate, and military institutions and provides his perspective on the security issues impacting the IT industry today.
Recently a reader brought up the name Bruce Schneier, one of the foremost authorities on information security, so I thought I would share this great article from Wired.
Information Technology Toolbox, Inc. is not affiliated with or endorsed by any company listed at this site.
blogs.ittoolbox.com /security/investigator   (730 words)

  
 Debian -- Security Information   (Site not responding. Last check: 2007-07-20)
The latest Debian security advisories are also available in RDF format.
Please read the Security Team FAQ before contacting us, your question may well be answered there already!
The contact information is in the FAQ as well.
www.us.debian.org /security   (290 words)

  
 Lab for Information Security Technology
Lab for Information Security Technology (LIST) was founded in 1995 by Ravi Sandhu to provide a dedicated facility for high-impact research in Information and System Security.
LIST has close ties to the Information and Software Engineering (ISE) Department and the Center for Secure Information Systems (CSIS).
LIST is also available to other School of Information Technology and Engineering faculty and students with interest in security.
www.list.gmu.edu   (78 words)

  
 Information Security Corporation
Information Security Corporation has focused on the design and development of standards-compliant public key encryption and authentication software since 1989.
Our products have been adopted and are widely deployed by the most security-conscious federal intelligence and law enforcement agencies, as well as by many large corporations.
While these RSA, DSA or ECC certificates may be used with any RFC3280-compliant application, their pincipal utility is in the establishment of secure communications among the expanding group of corporations that recognize our root certificate as a trust anchor for their enterprise security policies.
www.infoseccorp.com   (327 words)

Try your search on: Qwika (all wikis)

Factbites
  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.