jasminecorp.net directory
Updated Blogs
Computer Support Blog
Essensial Software for Web Based Support
HP Server and Desktop
HP ILO - Remote Tech-Support Software
More .....



 
 

| Add Search | Advertise With JCSearch | Suggest a Site

Search the Web


Search Results

Policy
Directory > Computers > Security > Policy

Categories
 
Companies (37) HIPAA (11) Sample Policies (33)

Web Sitesi

SANS InfoSec Reading Room
Articles on security policy and other infosec topics.
http://www.sans.org/rr/
Reviews Rating: Not yet Rated Whois Check

Information Security Policies
Make and manage security policies. Run awareness programs with audits and e-learning to build a
human firewall.

http://www.neupart.com
Reviews Rating: Not yet Rated Whois Check

OSSTMM: Open Source Security Testing Methodology Manual
A widely used, peer-reviewed, comprehensive methodology for performing security tests.
http://www.isecom.org/projects/osstmm.shtml
Reviews Rating: Not yet Rated Whois Check

Canada's Export Controls
Unofficial / unverified article describing Canada's export controls on cryptographic software.
http://www.efc.ca/pages/doc/crypto-export.html
Reviews Rating: Not yet Rated Whois Check

Institute for Security and Open Methodologies (ISECOM)
Non-profit, international research initiative dedicated to defining standards in security testing
and business integrity testing.

http://www.isecom.org
Reviews Rating: Not yet Rated Whois Check

Aelita Enterprise Directory Manager
Secure "Rules and Roles" management platform that facilitates secure Exchange and Active
Directory administration.

http://www.aelita.com/products/edm4.htm
Reviews Rating: Not yet Rated Whois Check

Building and Implementing a Successful Information Security Policy
White paper providing the reader with new and innovative aspects on the process of building a
Security Policy, as well as managing a Security Awareness Program.

http://www.windowsecurity.com/pages/security-policy.pdf
Reviews Rating: Not yet Rated Whois Check

An Induction to BS7799 and ISO 17799
A presentational site describing the specification and definition within Part 2 of the standard.
http://www.induction.to/bs7799/
Reviews Rating: Not yet Rated Whois Check

Acceptable Use Policy Report
A report on Acceptable Usage Policy: what corporations expect of it, a case study, and a framework
for creating your own policy.

http://members.iinet.net.au/~colinwee/mbt/acceptableuse/
Reviews Rating: Not yet Rated Whois Check

RUsecure Information Security Policies
The source site, including free to access download, for the ISO 17799-aligned RUsecure Information
Security Policies.

http://www.information-security-policies.com
Reviews Rating: Not yet Rated Whois Check

Developing an Information Security Strategy
This whitepaper describes the steps needed to develop an organization-wide information security
strategy.

http://www.hartgregorygroup.com/sec-strategies/LogicalSecurityStrategy.PDF
Reviews Rating: Not yet Rated Whois Check

GASSP Home Page
Generally Accepted System Security Principles, developed by The International Information Security
Foundation.

http://web.mit.edu/security/www/gassp1.html
Reviews Rating: Not yet Rated Whois Check

The BS7799 Security Zone
Information, guidence and resources to address the BS7799 security standard.
http://www.thewindow.to/bs7799/
Reviews Rating: Not yet Rated Whois Check

Implementing an Encryption Policy for the Mac OS X User
This paper provides the derivation and implementation of a security policy for Mac OS X users.
http://www.giac.org/practical/Kenneth_Shur_GSEC.doc
Reviews Rating: Not yet Rated Whois Check

The Basics of an IT Security Policy
This paper is intended to address the importance of having a written and enforceable Information
Technology (IT) security policy, and to provide an overview of the necessary components of an
effective policy.

http://www.giac.org/practical/jack_albright_gsec.doc
Reviews Rating: Not yet Rated Whois Check

How to Develop Good Security Policies and Tips on Assessment and Enforcement
[Word Document] Invest the time up front to carefully develop sound policies and then identify ways
to gauge their effectiveness and assess the level of compliance within your organization. Commit
to spending the time and resources required to ensure that the policies are kept current and
accurately reflect your company's security posture.

http://www.giac.org/practical/Kerry_McConnell_GSEC.doc
Reviews Rating: Not yet Rated Whois Check

Formulating a Wireless LAN Security Policy: Relevant Issues, Considerations and Implications
[Word Document] This paper represents the security issues related to the use of wireless (vs wired)
LAN technology and recommends a number of key implementation guidelines to ensure the secure
deployment of wireless LAN services in the company.

http://www.giac.org/practical/David_Quay_GSEC.doc
Reviews Rating: Not yet Rated Whois Check

What makes a good security policy and why is one necessary?
Security does not come from automated applications, rather it is compromised of security
applications or systems, processes and procedures and the personnel to implement both the systems
and processes. In order to properly address security, the most fundamental item necessary is a
security policy.

http://www.giac.org/practical/Caroline_Reyes_GSEC.doc
Reviews Rating: Not yet Rated Whois Check

E-Policy
E-policy is a corporate statement and set-of-rules to protect the organisation from casual or
intentional abuse that could result in the release of sensitive information, IT system failures or
litigation against the organisation by employees or other parties.

http://www.c2c.com/industry/whitepapers_policy.htm
Reviews Rating: Not yet Rated Whois Check

The Information Security Forum
It has produced the standard to provide guidelines on all aspects of information security including
IT, data, and computer controls.

http://www.isfsecuritystandard.com
Reviews Rating: Not yet Rated Whois Check

PKI Policy Whitepaper
This PKI Note provides general information about PKI policy, the role that policy plays in a PKI
and how that policy applies to both traditional and PKI-enabled business environments.

http://www.pkiforum.org/pdfs/pki_policy.pdf
Reviews Rating: Not yet Rated Whois Check

Browsing with a Loaded Gun
A strong web Security Policy is key to keeping your company safe in the net-centric world. (PDF
format)

http://www.pentasafe.com/whitepapers/LoadedGun.PDF
Reviews Rating: Not yet Rated Whois Check

ITworld.com - Security's human side
IT World article - essentially a review of Pentasafe's VigilEnt security policy management product.
http://www.itworld.com/Man/3903/IWD010529securityshuman/
Reviews Rating: Not yet Rated Whois Check

Information Security Policies & Computer Security Policy Directory
This directory is intended to help you ensure that your policies actually meet your needs.
http://www.information-security-policies-and-standards.com
Reviews Rating: Not yet Rated Whois Check

Internet Security Policy: A Technical Guide - Contents
This document is intended to help an organization create a coherent Internet-specific information
security policy.

http://secinf.net/info/policy/isptg.en/ISPTG-Contents.html
Reviews Rating: Not yet Rated Whois Check

Best Practices in Network Security
Knowing how and what to protect and what controls to put in place is difficult. It takes security
management, including planning, policy development and the design of procedures.

http://enterprisesecurity.symantec.com/article.cfm?articleid=42&PID=372347
Reviews Rating: Not yet Rated Whois Check

Site Security Policy Development
This paper outlines some issues that the writer of a Site Computer Security Policy may need to
consider when formulating such a document.

http://secinf.net/info/policy/AusCERT.html
Reviews Rating: Not yet Rated Whois Check

Why Security Policies Fail
Objective analysis reveals that many breaches are linked to common weaknesses in the security
policy...accidents waiting to happen. This article focuses on strategic and systematic weaknesses
that can slowly degrade security operations.

http://www.securityfocus.com/data/library/Why_Security_Policies_Fail.pdf
Reviews Rating: Not yet Rated Whois Check

What's Your Policy?
If your company doesn't have written security policies, it's time it did, and Mark Edwards has some
resources to help.

http://www.ntsecurity.net/Articles/Index.cfm?ArticleID=9764
Reviews Rating: Not yet Rated Whois Check

Windows 2000 Group Policy and Security
The use of Group Policy to simplify the network security tasks that you face as a network
administrator. With Group Policy, you can ensure that the machines on your network remain in a
secure configuration after you deploy them.

http://www.win2000mag.com/Articles/Index.cfm?ArticleID=9169
Reviews Rating: Not yet Rated Whois Check

P3P Guiding Principles
Principles behind the W3C Platform for Privacy Preferences initiative.
http://www.w3.org/TR/NOTE-P3P10-principles
Reviews Rating: Not yet Rated Whois Check

Do you have an intrusion detection response plan?
Discussion of what should go into the creation of an intrusion detection plan and the expected
results.

http://www.nwfusion.com/newsletters/sec/0913sec1.html
Reviews Rating: Not yet Rated Whois Check

Create Order with a Strong Policy
A well-written, well-run security policy keeps cracks from appearing in your network's foundation.
http://www.networkmagazine.com/article/NMG20000710S0015
Reviews Rating: Not yet Rated Whois Check

World of Information Security Management
This site contains information on BS 7799 (ISO/IEC 17799) including the official Register of BS
7799 Certificates, International BS 7799 User Group, papers on the application of BS 7799 produced
by business around the world.

http://www.xisec.com
Reviews Rating: Not yet Rated Whois Check

Firewalls and Internet Security
Good paper with theory and firewalls description. Network security policy example.
http://secinf.net/info/fw/steph/
Reviews Rating: Not yet Rated Whois Check

Structured Approach to Computer Security
A security policy is a set of rules written in general terms stating what is permitted and what is
not permitted in a system during normal operation.

http://www.ce.chalmers.se/staff/ulfl/pubs/tr122to.pdf
Reviews Rating: Not yet Rated Whois Check

CERT Practice Modules: Responding to Intrusions
Establish policies and procedures for responding to intrusions.
http://www.cert.org/security-improvement/modules/m06.html
Reviews Rating: Not yet Rated Whois Check

Information Security Program Development
Security standards are needed by organizations because of the amount of information, the value of
the information, and ease with which the information can be manipulated or moved.

http://www.blackmagic.com/ses/bruceg/progmgt.html
Reviews Rating: Not yet Rated Whois Check

Make Your Web Site P3P Compliant
How to create and publish your company's platform for privacy performance policy, a W3C initiative,
in 6 steps.

http://www.w3.org/P3P/details.html
Reviews Rating: Not yet Rated Whois Check

CERT Practice Modules: Improving Security
Determine contractor ability to comply with your organization's security policy.
http://www.cert.org/security-improvement/practices/p019.html
Reviews Rating: Not yet Rated Whois Check

How to Develop a Network Secuity Policy White Paper
This document is for business executives, and others, who want to know more about Internet and
internetworking security, and what measures you can take to protect your site.

http://www.sun.com/software/white-papers/wp-security-devsecpolicy/
Reviews Rating: Not yet Rated Whois Check

Policy Over Policing
InfoWorld article - It's easy to develop e-mail and Internet policies, but education and
documentation are crucial to their success.

http://archive.infoworld.com/cgi-bin/displayArchive.pl?/96/34/e01-34.55.htm
Reviews Rating: Not yet Rated Whois Check

CERT Practice Modules: Securing Desktop Workstations
Develop and promulgate an acceptable use policy for workstations.
http://www.cert.org/security-improvement/practices/p034.html
Reviews Rating: Not yet Rated Whois Check

Enhancing Enterprise Security
This is a solid site with a good overview of all factors which should go into to the design of a
security policy.

http://www.3com.com/technology/tech_net/white_papers/503023.html
Reviews Rating: Not yet Rated Whois Check

Internet/Network Security Policy Development
How to write an effective network security policy. This is Part 4 of a 5 part tutorial on Internet
and network security.

http://netsecurity.about.com/compute/netsecurity/library/weekly/aa080299.htm?iam=mt
Reviews Rating: Not yet Rated Whois Check

IT Security Cookbook
An excellent guide to computer & network security with a strong focus on writing and
implementing security policy. This is primarily for security managers and system administrators.

http://www.boran.com/security/
Reviews Rating: Not yet Rated Whois Check

Computer and Information Security Policy
Formal IT security policy helps establish standards for IT resource protection by assigning program
management responsibilities and providing basic rules, guidelines, and definitions for everyone in
the organization. Policy thus helps prevent inconsistencies that can introduce risks, and policy
serves as a basis for the enforcement of more detailed rules and procedures.

http://secinf.net/info/policy/hk_polic.html
Reviews Rating: Not yet Rated Whois Check

Email Policy.com
Learn how to create a company e-mail policy and enforce it using email security software. Also
lists sample email policies, books and links.

http://www.email-policy.com
Reviews Rating: Not yet Rated Whois Check

Building Effective, Tailored Information Security Policy
20th NISSC Internet Technical Security Policy Panel
http://csrc.nist.gov/nissc/1997/panels/isptg/pescatore/html/
Reviews Rating: Not yet Rated Whois Check

RFC2196 (Site Security Handbook)
a guide to developing computer security policies and procedures for sites that have systems on the
Internet. Published 1997.

http://www.cis.ohio-state.edu/htbin/rfc/rfc2196.html
Reviews Rating: Not yet Rated Whois Check

 


Jasminecorp.net directory is based on the Open Directory and is being modified by Jasminecorp.

©2004 Jasmine Computers Inc.

Click here to subscribe for Jasminecorp's product News.

Home | JCBid |Software Development | Domain Registration | Hosting | Web Designing | Buy Books | Advertise with JCSearch | Whois | IP Locator | Add Search | Shopping | Store | Free Blogs | Free GuestBook | Free E-Cards | Free Games | Free Tutorials | Set as Home | Add to Favorite | Suggest a Site | Directory | Our Portfolio | Terms of service | Free quote | Tell a Friend | Special Offer | Job Opportunities | games | Usenet Groups

Submit a Site to Jasminecorp.net Directory || Advertise with us

 

Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor
Get a Domain Name:
.com .us .info
.org .in .name
.net .biz .asia