Cyber security standards

Results: 368



#Item
61Computer network security / Crime prevention / United States Department of Homeland Security / Security management / Critical infrastructure protection / Cyber security standards / Security / National security / Computer security

TRIPWIRE COVERAGE OF NERC CIPv5 REQUIREMENTS 10 Standards | 32 Requirements CIP-002 CIP-003

Add to Reading List

Source URL: www.tripwire.com

Language: English
62Computer security / NIST Special Publication 800-53 / National Institute of Standards and Technology / International Multilateral Partnership Against Cyber Threats / Security Assertion Markup Language / OASIS / Security / Computing / Computer crimes

MQTT and the NIST Cybersecurity Framework Version 1.0 Committee NoteMay 2014 Specification URIs This version:

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2014-05-28 12:00:00
63National security / Public safety / Data security / International Multilateral Partnership Against Cyber Threats / Information security / National Institute of Standards and Technology / Cyber security standards / National Cyber Security Division / Security / Computer security / Crime prevention

Cybersecurity Framework National Restaurant Association Webinar - February 19, 2015 Presentation

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2015-03-05 19:24:37
64Computer security / Cyberwarfare / North American Electric Reliability Corporation / Cyber security standards / Federal Energy Regulatory Commission / Critical infrastructure protection / Reliability engineering / Generating Availability Data System / ReliabilityFirst / National security / Energy / Electric power

Microsoft Wordtestimony.doc

Add to Reading List

Source URL: www.ferc.gov

Language: English - Date: 2008-09-11 11:01:35
65Computing / Security / Internet protocols / Internet standards / Internet security / Domain Name System Security Extensions / Computer security / Botnet / Canadian Security Intelligence Service / Computer network security / Internet / Domain name system

CSIS Secure DNS Cyber Security Intelligence Services Last Line of Defence The security business is a jungle. What really matter are

Add to Reading List

Source URL: www.csis.dk

Language: English - Date: 2015-01-08 09:04:08
66Data security / Crime prevention / Information security / National security / Federal Information Security Management Act / Health Insurance Portability and Accountability Act / NIST Special Publication 800-53 / Cyber security standards / System administrator / Computer security / Security / Computing

Microsoft Word - ImportanceOfSecurityRolesAndResponsibilitiesV3.doc

Add to Reading List

Source URL: www.informationshield.com

Language: English - Date: 2010-06-03 23:12:51
67Security / North American Electric Reliability Corporation / Economy of North America / Critical infrastructure protection / Federal Energy Regulatory Commission / Reliability engineering / Critical infrastructure / Cyberwarfare / Cyber security standards / National security / Infrastructure / United States Department of Homeland Security

122 FERC ¶ 61,040 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION 18 CFR Part 40 [Docket No. RM06; Order NoMandatory Reliability Standards for Critical Infrastructure Protection

Add to Reading List

Source URL: www.ferc.gov

Language: English - Date: 2008-01-18 17:41:16
68Software / Multi-agent systems / Computer network security / Internet Information Services / Network management / System administration / Dynamic Host Configuration Protocol / SQL Slammer / Simple Network Management Protocol / Computing / System software / Internet standards

Cyber terrorism/warfare A packet can’t fly a plane… Typical types of attack: –Denial of service –Breeching the perimeter

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
69Software / Multi-agent systems / Computer network security / Internet Information Services / Network management / System administration / Dynamic Host Configuration Protocol / SQL Slammer / Simple Network Management Protocol / Computing / System software / Internet standards

Cyber terrorism/warfare A packet can’t fly a plane… Typical types of attack: –Denial of service –Breeching the perimeter

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
70DigitalEurope / Cyberwarfare / Computer security / Information Technology Industry Council / Business / Public safety / Cyber security standards / Cyber-security regulation / Security / Crime prevention / National security

Global Information and Communications Technology (ICT) Industry Statement Recommended Government Approaches to Cybersecurity June 2012 Cyber security is a high priority for governments, society, and industry globally. Po

Add to Reading List

Source URL: home.jeita.or.jp

Language: English - Date: 2012-06-22 00:29:35
UPDATE