Information Technology Security Assessment

Results: 459



#Item
1

This is to acknowledge that atsec information security corporation is an O-TTPS Recognized Assessor company eligible to provide assessment services in the Open Trusted Technology Providerâ„¢ Standard (O-TTPS) Accreditat

Add to Reading List

Source URL: www.atsec.com

- Date: 2015-09-14 08:15:51
    2Computing / Qualys / Computer security / Payment Card Industry Data Security Standard / Information technology / SAQ / Cloud computing security / Regulatory compliance / Questionnaire / Business process management / Cloud computing

    SAQ SECURITY ASSESSMENT QUESTIONNAIRE Assess Business Risk with Automated Campaigns

    Add to Reading List

    Source URL: www.qualys.com

    Language: English - Date: 2016-02-29 14:52:30
    3Computing / Prevention / Evaluation / Computer security / Security / Information technology management / Data security / IT risk management / Software assurance / Vulnerability / Application security / ISO/IEC 27000-series

    Principles for Software Assurance Assessment A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager,

    Add to Reading List

    Source URL: www.safecode.org

    Language: English - Date: 2015-11-20 16:43:16
    4Computing / Computer security / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Schematron / Federal Information Security Management Act / XML Schema / National Institute of Standards and Technology / Open Vulnerability and Assessment Language

    NIST SP 800-126A, SCAP 1.3 Component Specification Version Updates

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-18 13:17:50
    5Computer security / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / National Institute of Standards and Technology / Angela Orebaugh / Open Vulnerability and Assessment Language / Vulnerability / CVSS / Information Security Automation Program

    NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-18 13:14:41
    6Distance education / Educational psychology / Educational technology / Information technology / Computer security / Internet

    Technology, Networks, and Hardware Welcome to the Future Ready Gear Assessment for Technology, Networks, and Hardware. This assessment was designed to be taken by multiple persons in your district. All responses will be

    Add to Reading List

    Source URL: dashboard.futurereadyschools.org

    Language: English - Date: 2016-03-21 18:07:52
    7Computer security / Data security / Computer network security / Cryptography / National security / Security controls / Information security / National Institute of Standards and Technology / Vulnerability

    Independent Security Assessment Criteria Phase – I Version 1.1, datedFor: {Organization name} Performed on: {Date of Assessment}

    Add to Reading List

    Source URL: www.calguard.ca.gov

    Language: English - Date: 2016-07-18 16:29:13
    8Information technology / Open government / E-democracy / E-commerce / Government / E-government / E-governance / Information and communications technology / Information and communication technologies for development / Draft:ICT Security Policy System: A Case Study

    Microsoft Word - Chap6Iglesias_Egovernment Assessment on Philippine Cities-revised by Jen

    Add to Reading List

    Source URL: pascn.pids.gov.ph

    Language: English - Date: 2014-08-11 04:07:44
    9Computer security / Data security / Computer network security / Security controls / Security / Information security / Information technology controls / Information technology audit / Vulnerability / Audit / Professional certification / ISO/IEC JTC 1/SC 27

    Microsoft Word - NISTRev 4 Information Security Assessment Template (v2016.1)

    Add to Reading List

    Source URL: examples.complianceforge.com

    Language: English - Date: 2016-07-28 21:18:08
    10Government / Prevention / Library science / Information science / Government Accountability Office / Technology assessment / Librarian / Harvard Library / Library of Congress / Information security / United States Copyright Office / National library

    GAOLibrary of Congress: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses

    Add to Reading List

    Source URL: www.copyright.gov

    Language: English - Date: 2015-03-31 19:15:43
    UPDATE