Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • ==Web Application Auditing== ...k the application under test. You already have the most important tool for auditing web applications: a browser. If you use Firefox, you will be able to use a ...
    14 KB (2,387 words) - 13:41, 4 April 2007
  • '''Continuous Auditing''' or '''Proactive Auditing''' is an automatic method used to perform [[Information_Security_Audit | au The "continuous" aspect of continuous auditing and reporting refers to the real-time or near real-time capability for fina ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ==Sample Auditing Standard== ...on Policy:|'''Sample Asset Protection Standard''']], and provides specific auditing and logging requirements including activation, protection, retention, and s ...
    3 KB (444 words) - 20:12, 15 January 2014

Page text matches

  • ==Sample Auditing Standard== ...on Policy:|'''Sample Asset Protection Standard''']], and provides specific auditing and logging requirements including activation, protection, retention, and s ...
    3 KB (444 words) - 20:12, 15 January 2014
  • ...im's system is audited in the same way as a manual system, and whether the auditing system detected any computer crimes prior to the instant case. ...
    948 bytes (155 words) - 20:39, 22 February 2009
  • :Links to freely available security tools that are useful for auditing and securing applications, networks, and systems. Care should be taken when ...
    978 bytes (124 words) - 00:00, 26 March 2007
  • ===Set login auditing level=== * Set login auditing level to failure or all. ...
    7 KB (1,018 words) - 13:53, 14 May 2007
  • ...16, Reporting on Controls at a Service Organization, was finalized by the Auditing Standards Board of the American Institute of Certified Public Accountants ( ...itor's Report with an unqualified opinion that is issued by an Independent Auditing Firm differentiates the service organization from its peers by demonstratin ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...tions and requirements for auditing information assets are provided in the Auditing Standard.<br> ...
    5 KB (673 words) - 18:16, 14 January 2014
  • '''Continuous Auditing''' or '''Proactive Auditing''' is an automatic method used to perform [[Information_Security_Audit | au The "continuous" aspect of continuous auditing and reporting refers to the real-time or near real-time capability for fina ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...formation assets are provided in the [[Sample Auditing Standard:|'''Sample Auditing Standard''']].<br> ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...of standardized reports, such as trust services reports or a Statement of Auditing Standards 70 (SAS 70) report. ...eport on internal controls, including security, using SAS 70. SAS 70 is an auditing standard developed by the American Institute of Certified Public Accountant ...
    6 KB (829 words) - 19:14, 17 April 2007
  • :a. SOX.4.2.1.9: The UNIX operating system application has forensic auditing enabled to enable the monitoring of administrative access related events.<b ...
    3 KB (422 words) - 00:09, 13 June 2006
  • ...abases and highlights key components to look for and different methods for auditing these areas.<br> ..., and how they work. In particular, the following areas are key points in auditing logical security:<br> ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...and processed in accordance with the [[Sample Auditing Standard:|'''Sample Auditing Standard''']].<br> ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • :'''[[Auditing Firewalls: A Practical Guide]]'''<br> :Offers advice on the how and why of auditing firewalls, including a discussion of policy, design, audit, and tools.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...:|'''SOX.4.2.4.9''']] The OS/400 operating system application has forensic auditing enabled to enable the monitoring of administrative access related events.<b ...
    6 KB (821 words) - 18:11, 28 August 2006
  • ...ose covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of these systems should be reported to the appr ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ....9:|'''SOX.4.2.1.9''']] The UNIX operating system application has forensic auditing enabled to enable the monitoring of administrative access related events.<b ...
    7 KB (895 words) - 13:44, 23 June 2006
  • ...ose covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of these systems should be reported to the appr ...
    4 KB (507 words) - 14:58, 21 January 2014
  • :* Periodic auditing of host configurations, both manual and automated. ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ...cess Systems, in accordance with the [[Sample Auditing Standard:|'''Sample Auditing Standard''']], must log the date and time for all failed and successful use ...cess Systems, in accordance with the [[Sample Auditing Standard:|'''Sample Auditing Standard''']], must limit the number of failed remote access attempts to th ...
    14 KB (1,956 words) - 14:16, 1 May 2010
  • ...he whole life cycle of a configuration. By actively defining, tracing, and auditing configuration items, failures can be detected early, and corrective action === Software Configuration Auditing & Validation === ...
    22 KB (3,132 words) - 19:07, 17 April 2007
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)