Back to Results
First PageMeta Content
Law enforcement / Information technology audit / Clarksburg /  West Virginia / Criminal Justice Information Services Division / Criminal investigation / Federal Bureau of Investigation / National Crime Information Center / Information security audit / Information security / Criminal records / Security / Government


Information Technology Security Audit
Add to Reading List

Document Date: 2013-11-08 16:27:55


Open Document

File Size: 123,20 KB

Share Result on Facebook

Company

XYZ Shredding Company / Bluetooth Wireless / Noncriminal Justice Agencies / NIST / /

Country

United States / Canada / /

/

Facility

store CJI / National Institute of Standards and Technology / store FBI CJI / /

IndustryTerm

telecommunications infrastructure / software partitioning / mobile computing software/hardware / Internet Transmit Remote Access / local law enforcement / owned information systems / wireless access restrictions / physical and electronic media security / Wireless Cellular / patch management / law enforcement programs / Internet connections / law enforcements entities / communications center / software applications / hardware devices / criminal justice services / contractor services / electronic equipment / criminal justice network infrastructure / /

Organization

Contracting Government Agency / ADMINISTRATION OF CRIMINAL / Noncriminal Justice Agency / Which / U.S. Department of Commerce / National Crime Information Center / Terminal Agency / Federal Bureau of Investigation / FBI CJIS Division / CJIS Systems Agency / Data Center / National Institute of Standards and Technology / Oregon State Police / Criminal Justice Agency / Local Agency / IT / TAC / /

Position

Attorney General of the United States / Security Officer / Network Administrator / contractor / Agency Coordinator / private contractor / Coordinator / Administrator / Attorney General / /

ProgrammingLanguage

ABC / /

Technology

PKI / Information Technology Security Audit Pre-Audit Questionnaire Information Technology / CAD system / operating systems / Spyware Protection Software Encryption / encryption / 128-bit encryption / wireless access / Firewall / smartphones / Mobile Computing / simulation / minimum 128-bit encryption / PDA / CAD / /

URL

http /

SocialTag