The computer security policy is a statement by management of the minimum expectations to maintain the confidentiality, integrity and availability of the corporate network and all data stored on the network. The style, content and specific objectives of each policy are dependent on the environment, security requirements and corporate culture specific to each organization.
More information

Subcategories 4

Provides a report on Acceptable Usage Policy, including what corporations expect of it, a case study, and a framework for creating your own policy.
This paper is intended to explain the importance of having a written and enforceable Information Technology (IT) security policy, and to provide an overview of the necessary components of an effective policy.
A white paper providing the reader with new and innovative aspects on the process of building a Security Policy, as well as managing a Security Awareness Program. [PDF]
Presents the presentation of the 20th NISSC Internet Technical Security Policy Panel.
Unofficial / unverified article describing Canada's export controls on cryptographic software.
Discussion of what should go into the creation of an intrusion detection plan and the expected results.
Generally Accepted System Security Principles, developed by The International Information Security Foundation. [PDF]
[Word Document] Invest the time up front to carefully develop sound policies and then identify ways to gauge their effectiveness and assess the level of compliance within your organization. Commit to spending the time and resources required to ensure that the policies are kept current and accurately reflect your company's security posture.
Make and manage security policies. Run awareness programs with audits and e-learning to build a human firewall.
Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing.
Provides a wide range of policies, papers and related resources to support secure computing.
A guide to computer and network security with a strong focus on writing and implementing security policies. This is primarily intended for security managers and system administrators.
IT World article - essentially a review of Pentasafe's VigilEnt security policy management product.
Describes how to create and publish your company's platform for privacy performance policy,. A W3C initiative, in six steps.
This article discusses the elements of a corporate security policy, which it refers to as the gateway to a company`s intellectual property.
Defines the principles behind the W3C Platform for Privacy Preferences initiative.
Assess your company's Return on Information Security Investment
A guide to developing computer security policies and procedures for sites that have systems on the Internet. Published 1997.
Articles on security policies and other information security topics.
Security standards, transactions and code set standards, identifier standards, mailing lists, implementation guides, and administrative simplification.
This paper focuses on providing the reader with an overview of the current virus landscape and aids in developing best practice anti-virus policies.
Offers a paper presenting the core elements of security, and arguing that in order to properly address security, the most fundamental item necessary is a security policy.
A guide to computer and network security with a strong focus on writing and implementing security policies. This is primarily intended for security managers and system administrators.
Security standards, transactions and code set standards, identifier standards, mailing lists, implementation guides, and administrative simplification.
IT World article - essentially a review of Pentasafe's VigilEnt security policy management product.
Articles on security policies and other information security topics.
This paper is intended to explain the importance of having a written and enforceable Information Technology (IT) security policy, and to provide an overview of the necessary components of an effective policy.
This article discusses the elements of a corporate security policy, which it refers to as the gateway to a company`s intellectual property.
Provides a report on Acceptable Usage Policy, including what corporations expect of it, a case study, and a framework for creating your own policy.
Provides a wide range of policies, papers and related resources to support secure computing.
Presents the presentation of the 20th NISSC Internet Technical Security Policy Panel.
Defines the principles behind the W3C Platform for Privacy Preferences initiative.
A white paper providing the reader with new and innovative aspects on the process of building a Security Policy, as well as managing a Security Awareness Program. [PDF]
Offers a paper presenting the core elements of security, and arguing that in order to properly address security, the most fundamental item necessary is a security policy.
[Word Document] Invest the time up front to carefully develop sound policies and then identify ways to gauge their effectiveness and assess the level of compliance within your organization. Commit to spending the time and resources required to ensure that the policies are kept current and accurately reflect your company's security posture.
This paper focuses on providing the reader with an overview of the current virus landscape and aids in developing best practice anti-virus policies.
Describes how to create and publish your company's platform for privacy performance policy,. A W3C initiative, in six steps.
A guide to developing computer security policies and procedures for sites that have systems on the Internet. Published 1997.
Assess your company's Return on Information Security Investment
Discussion of what should go into the creation of an intrusion detection plan and the expected results.
Generally Accepted System Security Principles, developed by The International Information Security Foundation. [PDF]
Make and manage security policies. Run awareness programs with audits and e-learning to build a human firewall.
Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing.
Unofficial / unverified article describing Canada's export controls on cryptographic software.
Last update:
March 11, 2020 at 5:35:07 UTC
Computers
Games
Health
Home
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports
All Languages
Arts
Business