Enterprise information security architecture

Results: 258



#Item
41Information sharing / Public safety / Government Accountability Office / Enterprise architecture / Director of National Intelligence / National Counterterrorism Center / United States Department of Homeland Security / Information Sharing and Customer Outreach / Nationwide Suspicious Activity Reporting Initiative / Information Sharing Environment / National security / Government

Recycle!PleasePrintRecycledPaper

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2011-09-29 08:32:18
42Business / International Organization for Standardization / Generalised Enterprise Reference Architecture and Methodology / ISO 10303 / Information security management system / Computer-integrated manufacturing / Information technology management / Technology / James G. Nell

N 441 Meeting Minutes ISO/TC 184/SC 5/WG 1 : 2000-SeptemberNational Institute of Standards and Technology, Gaithersburg, MD, USA

Add to Reading List

Source URL: www.mel.nist.gov

Language: English - Date: 2000-11-16 10:56:27
43Information technology management / Evaluation / Computer law / Federal Information Security Management Act / Enterprise architecture / Enterprise life cycle / Capital Planning and Investment Control / Certification and Accreditation / Information security / Computer security / Data security / Security

DRAFT NIST Special PublicationIntegrating IT Security into the Capital Planning and Investment Control Process

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-21 15:30:17
44Information security management system / Auditing / Management / Ethics / Politics of the United States / Regulatory Flexibility Act / Enterprise Architecture Assessment Framework / United States administrative law / Government procurement in the United States / Audit

DOC Document

Add to Reading List

Source URL: www.housingregistrar.vic.gov.au

Language: English
45Network management / Internet Protocol / Computer network security / Lumeta Corporation / IPv6 / Network security / Simple Network Management Protocol / Security information and event management / Internet Mapping Project / Computing / Network architecture / Internet

DATA SHEET Enterprise Situational Intelligence You can attain a real-time, dynamic view of your network infrastructure using Lumeta® ESI. Running in an always-on mode, ESI delivers next-generation network discovery, le

Add to Reading List

Source URL: www.lumeta.com

Language: English - Date: 2014-07-11 16:11:09
46Government of Queensland / Information security / Public safety / Prevention / Enterprise architecture / Security / Government Enterprise Architecture

Queensland Government Information Security Framework UNCLASSIFIED CONSULTATION[removed]September 2008

Add to Reading List

Source URL: t4c46.pki.qld.gov.au

Language: English - Date: 2013-10-10 01:13:10
47Enterprise architecture / Certificate authority / Government Enterprise Architecture / Information security / Queensland / Public safety / National security / Key management / Public-key cryptography / Security

Queensland Government Information Security Framework UNCLASSIFIED CONSULTATION[removed]September 2008

Add to Reading List

Source URL: t4c46.pki.qld.gov.au

Language: English - Date: 2013-10-10 01:21:48
48Enterprise architecture / Government Enterprise Architecture / Government of Queensland / Certificate authority / Information security / Public safety / National security / Key management / Public-key cryptography / Security

Queensland Government Information Security Framework UNCLASSIFIED CONSULTATION[removed]September 2008

Add to Reading List

Source URL: t4c2.pki.qld.gov.au

Language: English - Date: 2013-10-10 00:55:30
49Public key certificate / Certificate authority / Government Enterprise Architecture / Key management / Public-key cryptography / Certificate policy

Queensland Government Information Security Framework UNCLASSIFIED CONSULTATION[removed]September 2008

Add to Reading List

Source URL: t4c47.pki.qld.gov.au

Language: English - Date: 2013-10-10 01:31:16
50Public safety / Technology / Enterprise architecture / Framework Programmes for Research and Technological Development / Emergency management / Computer security

The Northern Territory Government (NTG) is committed to securing private and/or confidential information in its possession. For this reason, the NTG has set up a secure organisation with all the necessary resources. The

Add to Reading List

Source URL: www.nt.gov.au

Language: English - Date: 2013-05-01 21:18:24
UPDATE