YURTSEVEN.ORG is completely for sale, including entire Databases and Domainname. Price: USD 499.999,- Phone: +49(176)74919078
Computers
»
Security
»
Policy
» Sample Policies
Web Pages 61 - 70 of 71
Back to
Sample Policies
Home
61 -
DMZ Security Policy
Sample policy establishing security requirements of equipment to be deployed in the corporate De-Militarized Zone. [MS Word]
http://www.sans.org/resources/policies/DMZ_Lab_Security_Policy.doc
[more pages from this URL]
62 -
Dial-in Access Policy
Policy regarding the use of dial-in connections to corporate networks. [MS Word]
http://www.sans.org/resources/policies/Dial-in_Access_Policy.doc
[more pages from this URL]
63 -
Router Security Policy
Sample policy establishing the minimum security requirements for all routers and switches connecting to production networks. [MS Word]
http://www.sans.org/resources/policies/Router_Security_Policy.doc
[more pages from this URL]
64 -
Law Enforcement Data Security Standards
IT security policy applicable to the Victoria Police in Australia. 93 pages based on ISO/IEC 27002 and related standards.
http://www.cleds.vic.gov.au/retrievemedia.asp?Media_ID=20338
[more pages from this URL]
65 -
Campus Security Policy
An overarching security policy from Berkeley University includes links to more specific and detailed policies.
https://security.berkeley.edu/IT.sec.policy.html
[more pages from this URL]
66 -
Privacy Policy
Concise policy (just 3 paragraphs) published by the School of Graduate Studies at Norwich University.
http://www.graduate.norwich.edu/privacy_policy.php
[more pages from this URL]
67 -
Ethics Policy
Ethical behavior underpins all procedural security controls. This ethics policy from Spirent is a useful model.
http://www.spirent.com/about/technology.cfm?media=7&ws=324&ss=177
[more pages from this URL]
68 -
Resource Utilization Policy
Policy template by Walt Kobus defines requirements for resilience, redundancy and fault tolerance in information systems.
http://www.tess-llc.com/Resource Utilization PolicyV4.pdf
[more pages from this URL]
69 -
Information Security Policies
111-page security policy manual from the Australian New South Wales Department of Commerce, based on ISO/IEC 27001.
http://www.gcio.nsw.gov.au/products-and-services/policies-guidelines/InformationSecurityGuidelineV1.1.pdf/at_download/file
[more pages from this URL]
70 -
Government Security Policy
The New Zealand Government's information security policy, based on the 2000 version of ISO/IEC 17799. [ZIP file containing PDF and MS Word versions]
http://www.security.govt.nz/sigs/sigs.zip
[more pages from this URL]
««
Previous
1
2
3
4
5
6
7
8
Next
»»
Add URL
|
My Listings
|
My Account
|
New Membership
|
Contact