Network Usage Security Policies for Academic Institutions

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evolving network structure of academic institutions

Today’s colleges and universities consist of highly complex structures that dictate interactions between the administration, faculty, and student body. These structures can play a role in dictating the efficiency of policy enacted by the administration and determine the effect that curriculum changes in one department have on other departments. Despite the fact that the features of these comple...

متن کامل

Deriving IPSec Network Security Policies from Organization Security Policies

This paper presents a new model for describing IPSec policies that can be derived by using classifications assigned to information flows. The classifications assigned to information flows are assigned in accordance with NIST information security guidelines.

متن کامل

Deriving IPSec Network Security Policies from Organization Security Policies

This paper presents a new model for describing IPSec policies that can be derived by using classifications assigned to information flows. The classifications assigned to information flows are assigned in accordance with NIST information security guidelines.

متن کامل

Institutional Conflict of Interest Policies at U.S. Academic Research Institutions.

PURPOSE Institutional conflicts of interest (ICOIs) occur when the institution or leaders with authority to act on behalf of the institution have conflicts of interest (COIs) that may threaten the objectivity, integrity, or trustworthiness of research because they could impact institutional decision making. The purpose of this study was to gather and analyze information about the ICOI policies ...

متن کامل

FreeBSD Mandatory Access Control Usage for Implementing Enterprise Security Policies

Security needs of organizations are becoming more and more sophisticated nowadays. Most general-purpose operating systems (GPOS) provide access control policies to meet these needs. There are cases when the traditionally deployed Discretionary Access Control (DAC) rules are not sufficient: they tend to quickly become unmanageable in the case of large installations, and also are not enough for c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2010

ISSN: 0975-8887

DOI: 10.5120/1332-1771