Browsing with a Loaded Gun
A strong web Security Policy is key to keeping your company safe in the net-centric world. (PDF format)
Building and Implementing a Successful Information Security Policy
White paper providing the reader with new and innovative aspects on the process of building a Security Policy, as well as managing a Security Awareness Program. [PDF]
Building Effective, Tailored Information Security Policy
20th NISSC Internet Technical Security Policy Panel
Canada's Export Controls
Unofficial / unverified article describing Canada's export controls on cryptographic software.
CERT Practice Modules: Improving Security
Determine contractor ability to comply with your organization's security policy.
CERT Practice Modules: Responding to Intrusions
Establish policies and procedures for responding to intrusions.
CERT Practice Modules: Securing Desktop Workstations
Develop and promulgate an acceptable use policy for workstations.
CobiT User Group
International user group and hub for CobiT, the emerging IT control and security methodology.
Common Criteria Evaluation and Validation Scheme
The US government agency overseeing the Common Criteria security certification Program
Computer and Information Security Policy
Formal IT security policy helps establish standards for IT resource protection by assigning program management responsibilities and providing basic rules, guidelines, and definitions for everyone in the organization. Policy thus helps prevent inconsistencies that can introduce risks, and policy serves as a basis for the enforcement of more detailed rules and procedures.
Create Order with a Strong Policy
A well-written, well-run security policy prevents cracks from appearing in your network's foundation.
Developing an Information Security Strategy
This whitepaper describes the steps needed to develop an organization-wide information security strategy.
Do you have an intrusion detection response plan?
Discussion of what should go into the creation of an intrusion detection plan and the expected results.
E-Policy
E-policy is a corporate statement and set-of-rules to protect the organization from casual or intentional abuse that could result in the release of sensitive information, IT system failures or litigation against the organization by employees or other parties.
Formulating a Wireless LAN Security Policy: Relevant Issues, Considerations and Implications
[Word Document] This paper represents the security issues related to the use of wireless (vs wired) LAN technology and recommends a number of key implementation guidelines to ensure the secure deployment of wireless LAN services in the company.
GASSP Home Page
Generally Accepted System Security Principles, developed by The International Information Security Foundation.
How to Develop a Network Security Policy White Paper
This document is for business executives, and others, who want to know more about Internet and internetworking security, and what measures you can take to protect your site.
How to Develop Good Security Policies and Tips on Assessment and Enforcement
[Word Document] Invest the time up front to carefully develop sound policies and then identify ways to gauge their effectiveness and assess the level of compliance within your organization. Commit to spending the time and resources required to ensure that the policies are kept current and accurately reflect your company's security posture.
IASEP Data Security Protocol
An archive website from the Purdue Research Foundation, containing a range of example security policy sets.
The Information Security Forum
It has produced the standard to provide guidelines on all aspects of information security including IT, data, and computer controls.
Results: Previous 1 2 3 4 5 6 7 8 9 10 11 12 Next