Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ==Change Management== ...for efficient handling of all Changes, in order to minimize the impact of Change-related incidents and to improve day-to-day operations. ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ==Service Desk Management== ...called for in IT Service Management (ITSM) as defined by the [[Information Technology Infrastructure Library]] (ITIL). It is intended to provide a Single Point o ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ...dling of all changes, and maintain the proper balance between the need for change and the potential detrimental impact of changes. ==Change management in development projects== ...
    4 KB (523 words) - 10:24, 23 April 2010
  • ==Configuration Management== ...rocess''' that tracks all of the individual Configuration Items (CI) in an information system which may be as simple as a single server, or as complex as the enti ...
    4 KB (570 words) - 16:12, 23 March 2007
  • ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as ...
    6 KB (885 words) - 10:12, 23 March 2007
  • [[Organizing Information Security:|'''Organizing Information Security''']]<br> [[Asset Management:|'''Asset Management''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • '''DS 5.7 Protection of Security Technology '''<br> Ensure that important security-related technology is made resistant to tampering and security documentation is not disclosed ...
    3 KB (377 words) - 18:52, 4 May 2006
  • ...ings are well known in hacker communities and easily determined via public information.<br> :'''PCI-2.1 Always change the vendor-supplied defaults before you install a system on the network (e. ...
    2 KB (283 words) - 17:00, 26 June 2006
  • ...Framework (MOF) 4.0''' is a series of guides aimed at helping information technology (IT) professionals establish and implement reliable, cost-effective service ...| governance]], [[Risk_management | risk]], and [[compliance]] activities; management reviews, and Microsoft Solutions Framework (MSF) best practices.<br> ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...e majority of their data processing, core processing, or other information technology systems or services are still expected to implement an appropriate BCP addr ...cial institutions are moving toward shorter recovery periods and designing technology recovery solutions into business processes. These technological advancement ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ==Security requirements of information systems== ...egory is to ensure that security is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • '''AI 6.1 Change Standards and Procedures'''<br> Set up formal change management procedures to handle in a standardized manner all requests (including maint ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ==Incident Management== ...| Service Level Management]] process area. The first goal of the incident management process is to restore a normal service operation as quickly as possible and ...
    9 KB (1,371 words) - 16:40, 23 May 2007
  • '''EVALUATION OF CONTROLS IN INFORMATION SYSTEMS (IS) QUESTIONNAIRE'''<br> ...estion. This can generally be achieved if the company involves an internal information systems auditor in the question answering process. Specific “Guidance Point ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ...anagement procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requ ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (819 words) - 13:54, 23 June 2006
  • =='''Sample Change Control Standard'''== ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • [[PO1.1:| 1.1 IT Value Management]]<br> [[PO1.6:| 1.6 IT Portfolio Management]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...sider include impact analysis, cost/benefit justification and requirements management.<br> ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    3 KB (425 words) - 13:19, 23 June 2006
  • ...bjective of this category is to ensure the correct and secure operation of information processing facilities.<br> ...formal organizational record, subject to appropriate change authorization, change tracking and archiving<br> ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...r abnormal activities that may need to be addressed. Access to the logging information is in line with business requirements in terms of access rights and retenti ...ngs, and disabling of SSID broadcasts. Enable Wi-Fi Protected Access (WPA) technology for [[Encryption | encryption]] and authentication when WPA-capable.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)