National Cyber Security Policy

Results: 150



#Item
61At the Nexus of Cybersecurity and Public Policy Some Basic Concepts and Issues Computer Science and Telecommunications Board ∙ Division on Engineering & Physical Sciences ∙ May 2014 Our nation is increasingly depende

At the Nexus of Cybersecurity and Public Policy Some Basic Concepts and Issues Computer Science and Telecommunications Board ∙ Division on Engineering & Physical Sciences ∙ May 2014 Our nation is increasingly depende

Add to Reading List

Source URL: sites.nationalacademies.org

Language: English - Date: 2014-09-14 11:12:25
62DSS Monthly Newsletter September[removed]Sent on behalf of ISR) Dear FSO, This is the monthly email containing recent information, policy guidance, security education and training updates. If you have any questions or reco

DSS Monthly Newsletter September[removed]Sent on behalf of ISR) Dear FSO, This is the monthly email containing recent information, policy guidance, security education and training updates. If you have any questions or reco

Add to Reading List

Source URL: www.dss.mil

Language: English - Date: 2014-11-19 14:33:00
63UC Davis Policy and Procedure Manual Chapter 310, Communications and Technology Section 22, UC Davis Cyber-Safety Program Date: [removed]Supersedes: [removed]Responsible Department: Information and Educational Technology

UC Davis Policy and Procedure Manual Chapter 310, Communications and Technology Section 22, UC Davis Cyber-Safety Program Date: [removed]Supersedes: [removed]Responsible Department: Information and Educational Technology

Add to Reading List

Source URL: manuals.ucdavis.edu

Language: English - Date: 2014-05-15 13:09:35
64NSPD 54: Cybersecurity Policy

NSPD 54: Cybersecurity Policy

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-06-09 10:09:55
65Aaron P. Padilla  Senior Advisor, Tax and Accounting Policy    1220 L Street, NW  Washington, DC  20005‐4070  Telephone 

Aaron P. Padilla  Senior Advisor, Tax and Accounting Policy    1220 L Street, NW  Washington, DC  20005‐4070  Telephone 

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-23 14:08:46
66Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 22:43:05
67Local Government Cyber Security: Internet and Acceptable Use Policy Template A Non-Technical Guide Essential for

Local Government Cyber Security: Internet and Acceptable Use Policy Template A Non-Technical Guide Essential for

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2010-09-13 14:44:27
68Cyber Security Internet and Acceptable Use Policy Template A Non-Technical Guide Essential for Business Managers

Cyber Security Internet and Acceptable Use Policy Template A Non-Technical Guide Essential for Business Managers

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2012-07-11 15:21:10
69CYBER SECURITY  SECURING VITAL INFRASTRUCTURE  In this issue GlobalSign looks at how Public Key Infrastructure (PKI)

CYBER SECURITY SECURING VITAL INFRASTRUCTURE In this issue GlobalSign looks at how Public Key Infrastructure (PKI)

Add to Reading List

Source URL: www.globalsign.com

Language: English - Date: 2014-04-24 10:16:50
70CYBER POLICY: A NATIONAL IMPERATIVE Melissa Hathaway Senior Advisor Belfer Center for Science and International Affairs Harvard University

CYBER POLICY: A NATIONAL IMPERATIVE Melissa Hathaway Senior Advisor Belfer Center for Science and International Affairs Harvard University

Add to Reading List

Source URL: belfercenter.ksg.harvard.edu

Language: English - Date: 2011-03-04 16:01:43