Network Usage Security Policies for Academic Institutions
نویسندگان
چکیده
منابع مشابه
Evolving network structure of academic institutions
Today’s colleges and universities consist of highly complex structures that dictate interactions between the administration, faculty, and student body. These structures can play a role in dictating the efficiency of policy enacted by the administration and determine the effect that curriculum changes in one department have on other departments. Despite the fact that the features of these comple...
متن کاملDeriving IPSec Network Security Policies from Organization Security Policies
This paper presents a new model for describing IPSec policies that can be derived by using classifications assigned to information flows. The classifications assigned to information flows are assigned in accordance with NIST information security guidelines.
متن کاملDeriving IPSec Network Security Policies from Organization Security Policies
This paper presents a new model for describing IPSec policies that can be derived by using classifications assigned to information flows. The classifications assigned to information flows are assigned in accordance with NIST information security guidelines.
متن کاملInstitutional Conflict of Interest Policies at U.S. Academic Research Institutions.
PURPOSE Institutional conflicts of interest (ICOIs) occur when the institution or leaders with authority to act on behalf of the institution have conflicts of interest (COIs) that may threaten the objectivity, integrity, or trustworthiness of research because they could impact institutional decision making. The purpose of this study was to gather and analyze information about the ICOI policies ...
متن کاملFreeBSD Mandatory Access Control Usage for Implementing Enterprise Security Policies
Security needs of organizations are becoming more and more sophisticated nowadays. Most general-purpose operating systems (GPOS) provide access control policies to meet these needs. There are cases when the traditionally deployed Discretionary Access Control (DAC) rules are not sufficient: they tend to quickly become unmanageable in the case of large installations, and also are not enough for c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2010
ISSN: 0975-8887
DOI: 10.5120/1332-1771