Information Technology Security Assessment

Results: 459



#Item
11Government / Prevention / Library science / Information science / Government Accountability Office / Technology assessment / Librarian / Harvard Library / Library of Congress / United States Copyright Office / Information security / Federal Information Technology Acquisition Reform Act

GAOLibrary of Congress: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2015-04-01 14:00:53
12Auditing / Computer security / Information technology audit / Data security / Corporate governance / Internal audit / Chief audit executive / Audit / Information security / Information Technology Security Assessment / Corporate governance of information technology / Security controls

© JORDAN YOUNGS Report of the Information and Communication Technology (ICT) Division – Information Technology Security Audit Fiscal Year (2014 – 2015)

Add to Reading List

Source URL: www.eco.gov.yk.ca

Language: English - Date: 2016-01-26 14:30:26
13Violent crime / War on Terror / Brian Michael Jenkins / Terrorism / Research and Innovative Technology Administration

  UTC Project Information Project Title Transit and Rail Security: A Critical Assessment of What Works

Add to Reading List

Source URL: transweb.sjsu.edu

Language: English - Date: 2016-02-01 14:34:30
14Computer security / Computing / Security / Security Content Automation Protocol / Mitre Corporation / Computer network security / National security / Software quality / Extensible Configuration Checklist Description Format / Common Vulnerabilities and Exposures / Vulnerability / Open Vulnerability and Assessment Language

Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2010-05-19 17:57:00
15Computing / Software engineering / Information society / Interpreter / Harri Hursti / Voter-verified paper audit trail / Software bug / Pointer / Hursti Hack / Electronic voting / Election fraud / Politics

Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:46
16Risk / Software testing / Risk management / Data security / Penetration test / Threat / Vulnerability / IT risk management / Information Technology Security Assessment / Security / Computer security / Computer network security

Complete Assessment Lifecycle

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
17Privacy law / Data security / Law / Security controls / Security management / Information technology management / Computer security / Data privacy / Health Insurance Portability and Accountability Act

HIPAA Security Rules Addressed in Guided Assessment Administrative Safeguards HIPAA Security Rule Reference Safeguard (Standard)

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
18Business / Accountability / Executive agencies of the Scottish Government / Security / Records management / Scottish Natural Heritage / Information security / Electronic document and records management system / National Archives of Scotland / Content management systems / Administration / Information technology management

Assessment Report

Add to Reading List

Source URL: www.nas.gov.uk

Language: English - Date: 2014-08-28 06:41:07
19Computer security / Risk management / Data security / Actuarial science / Risk / Information Technology Security Assessment / COCIR / Information security / Emergency management / Management / Security / Medicine

Microsoft Word - Information Security Risk Management for Healthcare Systems.doc

Add to Reading List

Source URL: www.medicalimaging.org

Language: English - Date: 2014-06-12 12:27:58
20National security / Human rights / Public safety / Computer network security / Science and Technology Options Assessment / Internet privacy / Open-source software / Cloud computing / Computer security / Security / Ethics / Crime prevention

Mass Surveillance Mass Surveillance What are the risks for citizens and the opportunities for the European Information Society? What are the possible mitigation strategies?

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-02-12 15:10:03
UPDATE