Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...nternet can provide unprotected pathways into key systems. Firewalls are a key protection mechanism for any computer network.<br> ::[[Image:Key-control.jpg]][[PCI-1.1.1:|PCI-1.1.1 A formal process for approving and test ...
    5 KB (702 words) - 12:20, 16 June 2010
  • ...ents and files include hidden data, firm-wide understanding about metadata management as a real security concern still lags. ===Key Strategies for Metadata Control=== ...
    4 KB (587 words) - 22:52, 15 March 2010
  • ::[[Image:Key-control.jpg]][[PCI-4.1.1:|PCI-4.1.1 For wireless networks transmitting card ::[[Image:Key-control.jpg]][[PCI-4.2:|PCI-4.2 Never send cardholder information via unenc ...
    2 KB (346 words) - 12:22, 31 January 2014
  • ...ines a DoD-wide formal and standard set of activities, general tasks and a management structure process for the [[Cyber security certification|certification]] an ...diacap.iaportal.navy.mil/ DIACAP Knowledge Service] (requires DoD [[Public key infrastructure|PKI]] certificate) ...
    2 KB (322 words) - 10:16, 15 April 2012
  • [[PO1.1:| 1.1 IT Value Management]]<br> [[PO1.6:| 1.6 IT Portfolio Management]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ::4. Company-issued electronic key cards are required to access Company Confidential Areas and Restricted Area ::9. Lost or misplaced identification badges and electronic key cards must be reported to the <SPECIFY CONTACT> and immediate supervisor wi ...
    12 KB (1,711 words) - 14:16, 1 May 2010
  • ...technology (IT), services, business processes generally, and human capital management. The CMM has been used extensively worldwide in government, commerce, indus ...capability maturity. Humphrey based this framework on the earlier Quality Management Maturity Grid developed by Philip B. Crosby in his book "Quality Is Free". ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • '''Federal Information Security Management Act (FISMA)''' ...the implementation of and compliance with the Federal Information Security Management Act including: ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ...mation technology (IT) systems and their performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiat ...tional involvement of board-level executives in IT issues was to defer all key decisions to the company's IT professionals. IT governance implies a system ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...chnology - Security techniques - Code of practice for information security management''. ...le for initiating, implementing or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in th ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...fication of exceptions or anomalies, analyze patterns within the digits of key numeric fields, review trends, and test controls, among other activities. ...jective of financial reporting is to provide information that is useful to management and stakeholders for resource allocation decisions. For financial informati ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • #[[Getting it Right in Records Management | Getting it Right in Records Management]] ...rds management survey - call for sustainable ... | 2009 electronic records management survey - call for sustainable ...]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]]s that are intended to support businesses in achieving both qu ...s (hence the term ''Library''), each of which covers a core area within IT Management. The names ''ITIL'' and ''IT Infrastructure Library'' are Registered Trade ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...pted to accomplish this by setting up [[risk management|risk]] and capital management requirements designed to ensure that a bank has capital adequacy for the ri ...ch more stringent standards were contemplated, and quickly adopted in some key countries including the USA. ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...covered that with an organized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by t ...lping you understanding the core elements of a successful IT security risk management program for a commercial enterprise, the processes of calculating the cost ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...tity, clearly class as PII under the definition used by the U.S. Office of Management and Budget (described in detail below): ...2007 in a memorandum from the Executive Office of the President, Office of Management and Budget (OMB), and that usage now appears in US standards such as the [h ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ==Risk Management== ...ng some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disas ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...islation set new or enhanced standards for all U.S. public company boards, management and public accounting firms. It does not apply to privately held companies. ...sses. In many cases, Audit Committee members were not truly independent of management. ...
    38 KB (5,614 words) - 14:31, 15 April 2010
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)