Examples of Computer Security in a sentence
Computer Security Tools and Advanced Video and Conference Tools 90 6.1. Network and Communication Devices 90 6.1.1. Network Technology Core Specification 90 6.1.2. Wireless Networking Equipment 93 6.1.3. LAN Switches 93 6.1.4. Network Router 94 6.1.5. Radio Equipment 95 6.1.6. Internet Protocol (IP) Telephony System 96 6.1.7. Cell Phone 96 6.1.8. Network Diagnostic Tools 96 6.1.9. Network Optimization Support for Core Routing & Switching 97 6.1.10.
If performance involves access to Company's cyber resources, this Agreement incorporates by reference Access to Company's Cyber Resources (Company – Sept 2013) and DEAR 952.204-77 Computer Security (Aug 2006).
The Contractor (and/or any subcontractor) shall respond to all alerts/Indicators of Compromise (IOCs) provided by HHS Computer Security Incident Response Center (CSIRC)/NIH IRT teams within 24 hours, whether the response is positive or negative.
Refer to the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-12, An Introduction to Computer Security: The NIST Handbook, Section 10.1.3, Filling the Position – Screening and Selecting.
Any material or data containing UCNI which is stored on computer systems must be protected, and the protective measures and/or policies must be specified in a Computer Protection Plan approved by the SRR Computer Security organization.
This consultation was completed on a computer system managed by NMFS in accordance with relevant information technology security policies and standards set out in Appendix III, ‘Security of Automated Information Resources,’ Office of Management and Budget Circular A-130; the Computer Security Act; and the Government Information Security Reform Act.
The Computer Security Awareness training examines appropriate technical, physical, personnel, and administrative controls to safeguard information.
Any material or data containing UCNI which is stored on computer systems must be protected, and the protective measures and/or policies must be specified in a Computer Protection Plan approved by the SRNS Computer Security organization.
If performance involves access to Company's cyber resources, this Agreement incorporates by reference Access to Company's Cyber Resources (Company – July 2010) and DEAR 952.204-77 Computer Security (Aug 2006).
Refer to the National Institute of Standards and Technology (NIST) Special Publication (SP) 300-12, An Introduction to Computer Security: The NIST Handbook, Section 10.1.3, Filling the Position – Screening and Selecting.