Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ==Annual independent evaluation== :'''(1)''' Each year each agency shall have performed an independent evaluation of the information security program and practices of that agency to determi ...
    4 KB (682 words) - 19:17, 3 June 2010
  • ==Annual independent evaluation== :'''(1)''' Each year each agency shall have performed an independent evaluation of the information security program and practices of that agency to determi ...
    4 KB (634 words) - 13:00, 4 June 2010
  • '''DS 7.3 Evaluation of Training Received '''<br> ...capturing and retention of knowledge, cost and value. The results of this evaluation should serve as input for future curriculum definition and training session ...
    2 KB (247 words) - 17:11, 5 May 2006
  • '''PO 7.7 Employee Job Performance Evaluation'''<br> Require timely evaluation to be performed on a regular basis against individual objectives derived fr ...
    2 KB (284 words) - 19:38, 1 May 2006
  • ...ality assurance]] testing of new or modified information systems, a formal evaluation and approval of the test results by management of the affected user departm ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • * [[44_USC_3535 | 3535. Annual independent evaluation]] * [[44_USC_3545 | 3545. Annual independent evaluation]] ...
    2 KB (207 words) - 11:58, 23 May 2010
  • [[ME3.3:| 3.3 Evaluation of Compliance with Regulatory Requirements]]<br> ...
    2 KB (195 words) - 19:06, 14 June 2007
  • ...s Security Evaluation Overview:|'''Holistic Operational Readiness Security Evaluation Overview.''']]<br> :Holistic Operational Readiness Security Evaluation - Comprehensive information security control and risk assessment guidance f ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    5 KB (649 words) - 18:23, 5 May 2006
  • '''Holistic Operational Readiness Security Evaluation (HORSE) Project Wiki''' is evolving every day. There are information securi ...
    2 KB (280 words) - 11:17, 30 November 2008
  • 1. Conduct an evaluation of the frequency and timeliness of management’s review of configuration rec ...
    2 KB (324 words) - 18:46, 25 June 2006
  • '''ME 3.3 Evaluation of Compliance with Regulatory Requirements'''<br> ...
    2 KB (271 words) - 13:16, 4 May 2006
  • '''EVALUATION OF CONTROLS IN INFORMATION SYSTEMS (IS) QUESTIONNAIRE'''<br> In order to expedite the IS controls evaluation process, this questionnaire is designed to be completed by the insurance co ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...e manuals, online help, service desk support, key user identification, and evaluation.<br> ...
    2 KB (298 words) - 16:59, 3 May 2006
  • ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ==Welcome to the Holistic Operational Readiness Security Evaluation (HORSE) project Wiki.== ...ncompass any legislative requirement or industry requirement with a common evaluation framework. The HORSE framework guides the organization through a single aud ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...plemented (Do) and the implementation is then evaluated (Check). After the evaluation the both the plans and the implementation of the plan are maintained (Act). ...velopment of security plans, the implementation of the security plans, the evaluation and how the results of the evaluations are translated into action plans. Fu ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...st, and report on whether a system meets certain principles and associated evaluation criteria. One of those principles is security. ...S 70 report in many important respects. The primary difference is that the evaluation criteria are uniform for all WebTrust and SysTrust reports. ...
    6 KB (829 words) - 19:14, 17 April 2007
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)