Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • == Requirement 5: Use and regularly update anti-virus software. == ...e used on all email systems and desktops to protect systems from malicious software. ...
    1 KB (199 words) - 18:10, 28 February 2007
  • ::'''Ensure that all anti-virus mechanisms are current, and actively running, and capable of generating aud :::'''PCI-5.2:''' To verify that anti-virus software is current as of (insert as-of date), actively running, and capable of gene ...
    2 KB (333 words) - 18:15, 28 February 2007
  • ==Sample Anti-Virus Standard== The Anti-Virus Standard builds on the objectives established in the [[Sample Asset Protect ...
    5 KB (765 words) - 20:00, 15 January 2014
  • ::'''Deploy anti-virus mechanisms on all systems commonly affected by viruses (e.g., PCs and serve ...er and/or description of sample) system components, verify that anti-virus software is installed.<br> ...
    2 KB (268 words) - 18:12, 28 February 2007
  • ...ducted in a secure manner; and maintain the security of application system software and data. This section provides templates for Information Security standard ...s for life cycle management of information systems, including hardware and software.<br> ...
    5 KB (613 words) - 18:14, 25 July 2006
  • ...igurations of the operating system (OS), browsers, and other network-aware software. ...rus, anti-spyware, and anti-rootkit software. An additional technology is software that limits applications calls to the OS to the minimum necessary for the a ...
    4 KB (568 words) - 17:25, 10 April 2007
  • '''DS 5.9 Malicious Software Prevention, Detection and Correction '''<br> ...m malware (viruses, worms, spy-ware, spam, internally developed fraudulent software, etc.). ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ...malicious code are provided in the [[Sample Anti-Virus Standard:|'''Sample Anti-Virus Standard''']].<br> ...
    5 KB (673 words) - 18:16, 14 January 2014
  • #### Anti-Virus ...retained regarding its physical location, operating system (or equivalent) software, including version and revision levels, and current configuration and secur ...
    5 KB (681 words) - 21:56, 15 January 2014
  • ::*Proper use of software and Electronic Communications Systems<br> ::*[[Sample Anti-Virus Standard:|'''Sample Anti-Virus Standard''']]<br> ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • # '''Electronic Mail Software''' ## Only Company approved versions and configurations of electronic mail software listed within the Company System of Record documentation may be used. ...
    7 KB (974 words) - 19:34, 16 January 2014
  • ...transmitting, or storing data and information, as well as the operation of software products and tools.<br> :'''C. Browser Software''' ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ...malicious code are provided in the [[Sample Anti-Virus Standard:|'''Sample Anti-Virus Standard''']].<br> ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...imported into some software programs. There are also several record search software packages available commercially. OFAC maintains current information and FAQ ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • :* Research all operating systems, software applications and data center equipment operating within the data center. ...k. These can include firewalls, intrusion detection systems, and antivirus software.<br> ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...echnical tools such as [[Firewall (computing)|firewalls]] and [[anti-virus software]], policies and procedures requiring such controls as regular backups and c ...
    7 KB (983 words) - 10:41, 15 April 2012
  • * [[PCI 5:|'''Requirement 5: Use and regularly update anti-virus software.''']] ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • ...rses you for BYOD expenses in service plans and usage, equipment costs and software expenses, the following actions may result in disciplinary action with your ...ogy Resources if it adversely impacts the intended performance of security software, data leakage controls and risk mitigating controls implemented by the Comp ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • *Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of e *Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless tele ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...ork and often jeopardized the whole project. By developing in iterations, software projects can limit effort wasted to a single iteration. ...managing or reducing risks. For example, a company may outsource only its software development, the manufacturing of hard goods, or customer support needs to ...
    27 KB (4,185 words) - 23:45, 10 March 2010
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)