IT Downloads Results for Type : Policies

All
All
 
 
Showing 1-10 of 97 Results    
 
 
Global13

Considerations for Identity Management in Public Safety Networks

  ITDownload  
  |   POLICIES   |   Apr 02, 2015
 

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use.

...  More >>

 
Security7

Risk Management for Replication Devices

  ITDownload  
  |   POLICIES   |   Feb 24, 2015
 

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices.

...  More >>

 
Mobile45

Vetting the Security of Mobile Applications

  ITDownload  
  |   POLICIES   |   Jan 26, 2015
 

The purpose of this document is to help organizations understand the process for vetting the security of mobile applications, plan for the implementation of an app vetting process, develop app security requirements, and understand the types of app vulnerabilities and the testing methods used to detect those vulnerabilities.

...  More >>

 
DataM25

Guidelines for Media Sanitization

  ITDownload  
  |   POLICIES   |   Dec 29, 2014
 

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorization of confidentiality of their information.

...  More >>

 
Security5TN

A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification

  ITDownload  
  |   POLICIES   |   Mar 19, 2014
 

This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications.

...  More >>

 
Security4TN

Framework for Improving Critical Infrastructure Cybersecurity

  ITDownload  
  |   POLICIES   |   Feb 14, 2014
 

The Framework enables organizations – regardless of size, degree of cybersecurity risk, or cybersecurity sophistication – to apply the principles and best practices of risk management to improving the security and resilience of critical infrastructure.

...  More >>

 
Security3TN

Guide to Attribute Based Access Control (ABAC) Definition and Considerations

  ITDownload  
  |   POLICIES   |   Jan 21, 2014
 

This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical access control methodology where authorization to perform a set of operations is determined by evaluating a variety of attributes.

...  More >>

 
Printer Policy

Printer Policy

  ITDownload  
  |   POLICIES   |   Mar 09, 2012
 

Develop and implement a comprehensive printer policy to control printing costs and practices....  More >>

 
Data Security Policy Template

Data Security Policy Template

  ITDownload  
  |   POLICIES   |   Sep 21, 2011
 

This policy template helps you set access rights that protect your key data and assets....  More >>

 
Wireless Use Policy Template

Wireless Use Policy Template

  ITDownload  
  |   POLICIES   |   Sep 12, 2011
 

Customize this policy to help lock down your network from the threat of unauthorized devices....  More >>

 
 
 
Pages:   1 2Next »  Last
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.