
- [XLS]
ussm.gsa.gov
Provide real-time continuous monitoring and collection of endpoint (e.g., networked computing devices such as workstations, mobile phones, servers) data with rules based automated analysis, detection, …
Industry-standard anti-malware mechanisms are active on networked computers in the organization. The organization has documented a procedure for evaluating, prioritizing, and implementing security …
- [XLS]
Mass.gov
NETWORKED (SHARED) ELECTRONIC BRANCHES (ATMs) MGL chapter 167B “Electronic Branch” .... includes all automated teller machines, cash dispensers, and scrip machines located within …
All FTI residual information is erased from the DASD volume. FTI is encrypted while traversing networked, or interconnected systems from remote locations. Entries residing in the MVS Program …
This will include operating systems, applications, and networked systems. Workforce Security Authorization and/or Supervision Applications will be required to provide automatic user logoff …
Existing Controls: Programmable Thermostats 1. Networked Thermostats (Building-Wide Programmable) Networked Thermostats 2. Existing Digital Energy Management System Existing …
Type of Access (email, shared drive, collaborative platform, etc.) Type of Dissemination (public database, private or limited access database, journal, conference, library, etc.) Legal Notes (e.g., …
- [XLS]
users.ece.utexas.edu
Oct 15, 2023 · Course syllabi for all undergrad UT Austin courses: https://utdirect.utexas.edu/apps/student/coursedocs/nlogon/ Elective Classes. 316 - Digital Logic …
Virtual machines and/or air-gapped systems should be used to isolate and run applications that are required for business operations but based on higher risk should not be installed within a networked …
- [XLS]
atwork.safeonweb.be
• This inventory includes fixed and portable computers, tablets, mobile phones, Programmable Logic Controllers (PLCs), sensors, actuators, robots, machine tools, firmware, network switches, routers, …