Information Security

@inproceedings{Crescenzo2001InformationS,
  title={Information Security},
  author={Giovanni Di Crescenzo and Olga Kornievskaia},
  booktitle={Lecture Notes in Computer Science},
  year={2001}
}
Workstation Requirements • Complex Passwords (8-16 characters, Upper/Lower, Numerical or Special character) • VCU approved antivirus system • Automatic lock of workstation after 10 minutes of inactivity. • Disable unneeded local accounts • Automatic Updates to be enabled (daily check) and Windows Firewall enabled; only VCU supported PC Operating Systems with most current patch installed • Maintain current patch level for all desktop/supported applications • The “remember passwords feature” in… CONTINUE READING
BETA

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 22 REFERENCES

Safely reducing the number of iterations in Montgomery modular multiplication

  • C. D. Walter
  • Efficient Implementation of Elliptic Curve…
  • 2001
Highly Influential
4 Excerpts

The AES Cipher Algorithm and Its Use with IPSec

  • S. Frankel, S. Kelly, R. Glenn
  • Network Working Group Internet Draft, November
  • 2000
Highly Influential
9 Excerpts

recommended elliptic curves for federal government use

  • NIST. NIST Documents
  • July
  • 1999
Highly Influential
4 Excerpts

Similar Papers

Loading similar papers…