Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • '''AI 6.2 Impact Assessment, Prioritization and Authorization'''<br> ...ured way for impacts on the operational system and its functionality. This assessment should include categorization and prioritization of changes. Prior to migra ...
    2 KB (346 words) - 20:00, 23 June 2006
  • [[ME1.4:| 1.4 Performance Assessment]]<br> [[ME2.4:| 2.4 Control Self-assessment]]<br> ...
    2 KB (195 words) - 19:06, 14 June 2007
  • '''PO 9.4 Risk Assessment'''<br> ...fied risks, using qualitative and quantitative methods. The likelihood and impact associated with inherent and residual risk should be determined individuall ...
    2 KB (304 words) - 20:21, 1 May 2006
  • ...fundamental process in quality control. It is also formally used where the impact of a change could have severe [[Risk_management | risk]] and or financial c ...request, and decides upon who should make an '''IMPACT ASSESSMENT'''. The IMPACT ASSESSOR or ASSESSORS then make their risk analysis and make a judgment on ...
    3 KB (533 words) - 14:15, 23 April 2010
  • =='''Sample Threat Assessment Standard'''== ...Policy''']] defines objectives for establishing specific standards on the assessment and ongoing monitoring of threats to Company information assets.<br> ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • ...Security Evaluation - Comprehensive information security control and risk assessment guidance for the enterprise demystified. This presentation was offered at t ...f wireless local area networks (WLANs), the main features of WLANs, common assessment tools, and network architecture best practices for improving wireless secur ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...lity exposures that may permit unauthorized access to systems and data and impact financial reporting. .'''<br> :::a. [[SOX.2.0.32:|'''SOX.2.0.32''']] Periodic testing and assessment is performed to confirm that the software and network infrastructure is app ...
    2 KB (288 words) - 18:53, 25 June 2006
  • 1. Determine that a risk assessment of the potential impact of changes to system software is performed. ...
    2 KB (303 words) - 19:58, 23 June 2006
  • IT controls result from an effective, risk assessment process. Therefore, the ability to mitigate IT risks is dependent upon risk :* An ongoing risk assessment process that evaluates the environment and potential changes ...
    4 KB (528 words) - 16:58, 28 March 2010
  • ...lity exposures that may permit unauthorized access to systems and data and impact financial reporting ...lity exposures that may permit unauthorized access to systems and data and impact financial reporting. .'''<br> ...
    3 KB (429 words) - 18:55, 25 June 2006
  • =='''Vulnerability Assessment Standard'''== ...Policy''']] defines objectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • * A risk assessment that addresses likely causes and consequences of information system failure ===Business continuity and risk assessment=== ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ...t are likely to affect them. The Service Desk is in the direct line of any impact on the Service Level Agreement (SLA) and as such should be kept rapidly inf ...tating the restoration of normal operational service with minimal business impact on the customer within agreed levels SLA and business priorities. ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ...ancial reporting objectives. Deficiencies in this area could significantly impact financial reporting. For instance, changes to the programs that allocate fi ...or program changes may not meet all control requirements or may negatively impact existing processing.'''<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • '''PO 1.3 Assessment of Current Performance'''<br> ...of logging required for individual systems should be determined by a risk assessment, taking performance degradation into account.<br> ...
    4 KB (586 words) - 01:37, 1 May 2006
  • '''Risk assessment''' is a step in the [[risk management]] process. Risk assessment is [[measurement|measuring]] two quantities of the [[risk]] ''R'', the magn Risk assessment may be the most important step in the risk management process, and may also ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • ...cost to the asset's stakeholders. The sum of the products of the threats' impact and the probability of their occurring is the total risk to the information With the risk assessment complete, the IA practitioner then develops a [[Risk Management Plan|risk m ...
    7 KB (983 words) - 10:41, 15 April 2012
  • * Specifications based on a thorough risk assessment, that considers appropriate algorithm selections, key management and other * A risk assessment, analysis of actual and potential impacts of changes, and specification of ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...ess needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requirements.<br> ::'''2. Risk: The impact of application system changes (e.g., hardware and software) should be evalu ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...dance with the defined acceptance plan and based on an impact and resource assessment that includes performance sizing in a separate test environment by an indep ...
    3 KB (497 words) - 14:57, 23 June 2006
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)