CPNI

Results: 107



#Item
91Technology / Classified information / Information sensitivity / Containerization / Verification and validation / Tamper-evident / Access control / Security / Computer security / Systems engineering

Secure destruction of sensitive items

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-04-14 10:55:20
92Gates / Doors / Centre for the Protection of National Infrastructure / Computer security / Dead bolt / Access control / Safe / Padlock / Security engineering / Security / Locks

Guide to security doorsets locking hardware

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2013-07-26 10:43:08
93Security / Log analysis / Server log / Security information and event management / Information security / Network security / Log / Proxy server / Log management and intelligence / Computer security / Computing / Data security

Centre for the Protection of National Infrastructure Effective Log Management Author: Tom Goldsmith Context Ref: [removed]CPNI-CTX - Effective Log Management

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-05-16 06:14:27
94Electronics / Information appliances / Cloud clients / Mobile computers / Mobile device management / IOS jailbreaking / Android / IPhone / Mobile Web / Technology / Computing / Smartphones

Mobile_Security_Graphic on white

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2013-02-27 10:09:06
95Computer hardware / Cloud clients / Wireless / Wi-Fi / Android / USB flash drive / Universal Serial Bus / Mobile Web / USB mass-storage device class / Technology / Computing / Smartphones

Mobile Devices Executive Briefing Paper February 2013 Mobile Devices

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2013-02-27 10:09:58
96Data security / System software / Log analysis / Network security / Server log / Proxy server / Security information and event management / Telecommunications data retention / Keystroke logging / Computer security / Computing / Security

Effective Log Management www.contextis.com About Introduction

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-05-16 06:14:12
97Cryptography / Cyberwarfare / Internet privacy / Network architecture / Disk encryption / Password / Passphrase / Two-factor authentication / Virtual private network / Computer security / Security / Computer network security

Mobile Devices Guide for Managers February 2013 Mobile Devices

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2013-02-27 10:09:34
98Security Policy Framework / Government / Politics / Classified information / Government of the United Kingdom / Information sensitivity

DOC Document

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2013-07-29 09:16:22
99Computing / Automation / SCADA / Distributed control system / Remote Terminal Unit / Industrial control system / Energy management system / Internet protocol suite / Building management system / Technology / Telemetry / Industrial automation

PDF Document

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2011-11-27 05:59:51
100Customer proprietary network information / Telecommunications / Telemarketing

CPNI Deterrence Communications - a practical, low cost layer of protective security Hostile reconnaissance is an essential part of attack planning, whether

Add to Reading List

Source URL: www.nationalarchives.gov.uk

Language: English - Date: 2013-11-22 05:29:03
UPDATE