Information Security

  title={Information Security},
  author={Giovanni Di Crescenzo and Olga Kornievskaia},
  booktitle={Lecture Notes in Computer Science},
Workstation Requirements • Complex Passwords (8-16 characters, Upper/Lower, Numerical or Special character) • VCU approved antivirus system • Automatic lock of workstation after 10 minutes of inactivity. • Disable unneeded local accounts • Automatic Updates to be enabled (daily check) and Windows Firewall enabled; only VCU supported PC Operating Systems with most current patch installed • Maintain current patch level for all desktop/supported applications • The “remember passwords feature” in… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications referenced by this paper.

Safely reducing the number of iterations in Montgomery modular multiplication

  • C. D. Walter
  • Efficient Implementation of Elliptic Curve…
  • 2001
Highly Influential
4 Excerpts

The AES Cipher Algorithm and Its Use with IPSec

  • S. Frankel, S. Kelly, R. Glenn
  • Network Working Group Internet Draft, November
  • 2000
Highly Influential
9 Excerpts

recommended elliptic curves for federal government use

  • NIST. NIST Documents
  • July
  • 1999
Highly Influential
4 Excerpts

Similar Papers

Loading similar papers…