Directory > Computers > Security > Policy SANS InfoSec Reading Room Articles on security policy and other infosec topics. http://www.sans.org/rr/ Reviews Rating: Not yet Rated
Whois Check
Information Security Policies Make and manage security policies. Run awareness programs with audits and e-learning to build a human firewall. http://www.neupart.com Reviews Rating: Not yet Rated
Whois Check
OSSTMM: Open Source Security Testing Methodology Manual A widely used, peer-reviewed, comprehensive methodology for performing security tests. http://www.isecom.org/projects/osstmm.shtml Reviews Rating: Not yet Rated
Whois Check
Canada's Export Controls Unofficial / unverified article describing Canada's export controls on cryptographic software. http://www.efc.ca/pages/doc/crypto-export.html Reviews Rating: Not yet Rated
Whois Check
Institute for Security and Open Methodologies (ISECOM) Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing. http://www.isecom.org Reviews Rating: Not yet Rated
Whois Check
Aelita Enterprise Directory Manager Secure "Rules and Roles" management platform that facilitates secure Exchange and Active Directory administration. http://www.aelita.com/products/edm4.htm Reviews Rating: Not yet Rated
Whois Check
Building and Implementing a Successful Information Security Policy White paper providing the reader with new and innovative aspects on the process of building a Security Policy, as well as managing a Security Awareness Program. http://www.windowsecurity.com/pages/security-policy.pdf Reviews Rating: Not yet Rated
Whois Check
An Induction to BS7799 and ISO 17799 A presentational site describing the specification and definition within Part 2 of the standard. http://www.induction.to/bs7799/ Reviews Rating: Not yet Rated
Whois Check
Acceptable Use Policy Report A report on Acceptable Usage Policy: what corporations expect of it, a case study, and a framework for creating your own policy. http://members.iinet.net.au/~colinwee/mbt/acceptableuse/ Reviews Rating: Not yet Rated
Whois Check
RUsecure Information Security Policies The source site, including free to access download, for the ISO 17799-aligned RUsecure Information Security Policies. http://www.information-security-policies.com Reviews Rating: Not yet Rated
Whois Check
Developing an Information Security Strategy This whitepaper describes the steps needed to develop an organization-wide information security strategy. http://www.hartgregorygroup.com/sec-strategies/LogicalSecurityStrategy.PDF Reviews Rating: Not yet Rated
Whois Check
GASSP Home Page Generally Accepted System Security Principles, developed by The International Information Security Foundation. http://web.mit.edu/security/www/gassp1.html Reviews Rating: Not yet Rated
Whois Check
The BS7799 Security Zone Information, guidence and resources to address the BS7799 security standard. http://www.thewindow.to/bs7799/ Reviews Rating: Not yet Rated
Whois Check
Implementing an Encryption Policy for the Mac OS X User This paper provides the derivation and implementation of a security policy for Mac OS X users. http://www.giac.org/practical/Kenneth_Shur_GSEC.doc Reviews Rating: Not yet Rated
Whois Check
The Basics of an IT Security Policy This paper is intended to address the importance of having a written and enforceable Information Technology (IT) security policy, and to provide an overview of the necessary components of an effective policy. http://www.giac.org/practical/jack_albright_gsec.doc Reviews Rating: Not yet Rated
Whois Check
How to Develop Good Security Policies and Tips on Assessment and Enforcement [Word Document] Invest the time up front to carefully develop sound policies and then identify ways to gauge their effectiveness and assess the level of compliance within your organization. Commit to spending the time and resources required to ensure that the policies are kept current and accurately reflect your company's security posture. http://www.giac.org/practical/Kerry_McConnell_GSEC.doc Reviews Rating: Not yet Rated
Whois Check
Formulating a Wireless LAN Security Policy: Relevant Issues, Considerations and Implications [Word Document] This paper represents the security issues related to the use of wireless (vs wired) LAN technology and recommends a number of key implementation guidelines to ensure the secure deployment of wireless LAN services in the company. http://www.giac.org/practical/David_Quay_GSEC.doc Reviews Rating: Not yet Rated
Whois Check
What makes a good security policy and why is one necessary? Security does not come from automated applications, rather it is compromised of security applications or systems, processes and procedures and the personnel to implement both the systems and processes. In order to properly address security, the most fundamental item necessary is a security policy. http://www.giac.org/practical/Caroline_Reyes_GSEC.doc Reviews Rating: Not yet Rated
Whois Check
E-Policy E-policy is a corporate statement and set-of-rules to protect the organisation from casual or intentional abuse that could result in the release of sensitive information, IT system failures or litigation against the organisation by employees or other parties. http://www.c2c.com/industry/whitepapers_policy.htm Reviews Rating: Not yet Rated
Whois Check
The Information Security Forum It has produced the standard to provide guidelines on all aspects of information security including IT, data, and computer controls. http://www.isfsecuritystandard.com Reviews Rating: Not yet Rated
Whois Check
PKI Policy Whitepaper This PKI Note provides general information about PKI policy, the role that policy plays in a PKI and how that policy applies to both traditional and PKI-enabled business environments. http://www.pkiforum.org/pdfs/pki_policy.pdf Reviews Rating: Not yet Rated
Whois Check
Browsing with a Loaded Gun A strong web Security Policy is key to keeping your company safe in the net-centric world. (PDF format) http://www.pentasafe.com/whitepapers/LoadedGun.PDF Reviews Rating: Not yet Rated
Whois Check
ITworld.com - Security's human side IT World article - essentially a review of Pentasafe's VigilEnt security policy management product. http://www.itworld.com/Man/3903/IWD010529securityshuman/ Reviews Rating: Not yet Rated
Whois Check
Information Security Policies & Computer Security Policy Directory This directory is intended to help you ensure that your policies actually meet your needs. http://www.information-security-policies-and-standards.com Reviews Rating: Not yet Rated
Whois Check
Internet Security Policy: A Technical Guide - Contents This document is intended to help an organization create a coherent Internet-specific information security policy. http://secinf.net/info/policy/isptg.en/ISPTG-Contents.html Reviews Rating: Not yet Rated
Whois Check
Best Practices in Network Security Knowing how and what to protect and what controls to put in place is difficult. It takes security management, including planning, policy development and the design of procedures. http://enterprisesecurity.symantec.com/article.cfm?articleid=42&PID=372347 Reviews Rating: Not yet Rated
Whois Check
Site Security Policy Development This paper outlines some issues that the writer of a Site Computer Security Policy may need to consider when formulating such a document. http://secinf.net/info/policy/AusCERT.html Reviews Rating: Not yet Rated
Whois Check
Why Security Policies Fail Objective analysis reveals that many breaches are linked to common weaknesses in the security policy...accidents waiting to happen. This article focuses on strategic and systematic weaknesses that can slowly degrade security operations. http://www.securityfocus.com/data/library/Why_Security_Policies_Fail.pdf Reviews Rating: Not yet Rated
Whois Check
What's Your Policy? If your company doesn't have written security policies, it's time it did, and Mark Edwards has some resources to help. http://www.ntsecurity.net/Articles/Index.cfm?ArticleID=9764 Reviews Rating: Not yet Rated
Whois Check
Windows 2000 Group Policy and Security The use of Group Policy to simplify the network security tasks that you face as a network administrator. With Group Policy, you can ensure that the machines on your network remain in a secure configuration after you deploy them. http://www.win2000mag.com/Articles/Index.cfm?ArticleID=9169 Reviews Rating: Not yet Rated
Whois Check
P3P Guiding Principles Principles behind the W3C Platform for Privacy Preferences initiative. http://www.w3.org/TR/NOTE-P3P10-principles Reviews Rating: Not yet Rated
Whois Check
Do you have an intrusion detection response plan? Discussion of what should go into the creation of an intrusion detection plan and the expected results. http://www.nwfusion.com/newsletters/sec/0913sec1.html Reviews Rating: Not yet Rated
Whois Check
Create Order with a Strong Policy A well-written, well-run security policy keeps cracks from appearing in your network's foundation. http://www.networkmagazine.com/article/NMG20000710S0015 Reviews Rating: Not yet Rated
Whois Check
World of Information Security Management This site contains information on BS 7799 (ISO/IEC 17799) including the official Register of BS 7799 Certificates, International BS 7799 User Group, papers on the application of BS 7799 produced by business around the world. http://www.xisec.com Reviews Rating: Not yet Rated
Whois Check
Firewalls and Internet Security Good paper with theory and firewalls description. Network security policy example. http://secinf.net/info/fw/steph/ Reviews Rating: Not yet Rated
Whois Check
Structured Approach to Computer Security A security policy is a set of rules written in general terms stating what is permitted and what is not permitted in a system during normal operation. http://www.ce.chalmers.se/staff/ulfl/pubs/tr122to.pdf Reviews Rating: Not yet Rated
Whois Check
CERT Practice Modules: Responding to Intrusions Establish policies and procedures for responding to intrusions. http://www.cert.org/security-improvement/modules/m06.html Reviews Rating: Not yet Rated
Whois Check
Information Security Program Development Security standards are needed by organizations because of the amount of information, the value of the information, and ease with which the information can be manipulated or moved. http://www.blackmagic.com/ses/bruceg/progmgt.html Reviews Rating: Not yet Rated
Whois Check
Make Your Web Site P3P Compliant How to create and publish your company's platform for privacy performance policy, a W3C initiative, in 6 steps. http://www.w3.org/P3P/details.html Reviews Rating: Not yet Rated
Whois Check
CERT Practice Modules: Improving Security Determine contractor ability to comply with your organization's security policy. http://www.cert.org/security-improvement/practices/p019.html Reviews Rating: Not yet Rated
Whois Check
How to Develop a Network Secuity Policy White Paper This document is for business executives, and others, who want to know more about Internet and internetworking security, and what measures you can take to protect your site. http://www.sun.com/software/white-papers/wp-security-devsecpolicy/ Reviews Rating: Not yet Rated
Whois Check
Policy Over Policing InfoWorld article - It's easy to develop e-mail and Internet policies, but education and documentation are crucial to their success. http://archive.infoworld.com/cgi-bin/displayArchive.pl?/96/34/e01-34.55.htm Reviews Rating: Not yet Rated
Whois Check
CERT Practice Modules: Securing Desktop Workstations Develop and promulgate an acceptable use policy for workstations. http://www.cert.org/security-improvement/practices/p034.html Reviews Rating: Not yet Rated
Whois Check
Enhancing Enterprise Security This is a solid site with a good overview of all factors which should go into to the design of a security policy. http://www.3com.com/technology/tech_net/white_papers/503023.html Reviews Rating: Not yet Rated
Whois Check
Internet/Network Security Policy Development How to write an effective network security policy. This is Part 4 of a 5 part tutorial on Internet and network security. http://netsecurity.about.com/compute/netsecurity/library/weekly/aa080299.htm?iam=mt Reviews Rating: Not yet Rated
Whois Check
IT Security Cookbook An excellent guide to computer & network security with a strong focus on writing and implementing security policy. This is primarily for security managers and system administrators. http://www.boran.com/security/ Reviews Rating: Not yet Rated
Whois Check
Computer and Information Security Policy Formal IT security policy helps establish standards for IT resource protection by assigning program management responsibilities and providing basic rules, guidelines, and definitions for everyone in the organization. Policy thus helps prevent inconsistencies that can introduce risks, and policy serves as a basis for the enforcement of more detailed rules and procedures. http://secinf.net/info/policy/hk_polic.html Reviews Rating: Not yet Rated
Whois Check
Email Policy.com Learn how to create a company e-mail policy and enforce it using email security software. Also lists sample email policies, books and links. http://www.email-policy.com Reviews Rating: Not yet Rated
Whois Check
Building Effective, Tailored Information Security Policy 20th NISSC Internet Technical Security Policy Panel http://csrc.nist.gov/nissc/1997/panels/isptg/pescatore/html/ Reviews Rating: Not yet Rated
Whois Check
RFC2196 (Site Security Handbook) a guide to developing computer security policies and procedures for sites that have systems on the Internet. Published 1997. http://www.cis.ohio-state.edu/htbin/rfc/rfc2196.html Reviews Rating: Not yet Rated
Whois Check
|