Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ==National security systems== ...head of each agency operating or exercising control of a national security system shall be responsible for ensuring that the agency—<br> ...
    709 bytes (103 words) - 10:41, 2 June 2010
  • ==National security systems== ...head of each agency operating or exercising control of a national security system shall be responsible for ensuring that the agency—<br> ...
    709 bytes (103 words) - 21:02, 3 June 2010
  • ==Federal information security incident center== ...— The Director shall ensure the operation of a central Federal information security incident center to—<br> ...
    1 KB (196 words) - 19:07, 3 June 2010
  • == Requirement 11: Regularly test security systems and processes. == ...tems, processes, and custom software should be tested frequently to ensure security is maintained over time and through changes. ...
    3 KB (372 words) - 17:59, 7 July 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.4.2.4.5:|'''SOX.4.2.4.5''']] The OS/400 operating application has a session "Time-Out" function enabled.<br> ...
    6 KB (821 words) - 18:11, 28 August 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.4.2.2.5:|'''SOX.4.2.2.5''']] The WINDOWS operating application has a session "Time-Out" function enabled.<br> ...
    6 KB (779 words) - 13:45, 23 June 2006
  • :a. [[SOX.2.1.1.1:|'''SOX.2.1.1.1''']] The ROUTER operating application has a session "Time-Out" function enabled.<br> :a. [[SOX.2.1.1.3:|'''SOX.2.1.1.3''']] The ROUTER system will not allow identical administrator IDs.<br> ...
    6 KB (729 words) - 13:40, 23 June 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.2.1.3.5:|'''SOX.2.1.3.5''']] The VPN operating application has a session "Time-Out" function enabled.<br> ...
    6 KB (766 words) - 13:42, 23 June 2006
  • ::'''Examine the organization’s system configuration standards for network components and critical servers, includ ...e that they have knowledge of common security parameter settings for their operating systems, database servers, Web servers, and wireless systems.<br> ...
    3 KB (366 words) - 13:52, 28 February 2007
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.2.1.2.5:|'''SOX.2.1.2.5''']] The FIREWALL operating application has a session "Time-Out" function enabled.<br> ...
    6 KB (816 words) - 13:41, 23 June 2006
  • '''DS 5.1 Management of IT Security'''<br> ...rity at the highest appropriate organizational level, so the management of security actions is in line with business requirements. ...
    3 KB (394 words) - 17:12, 22 March 2007
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.4.2.1.5:|'''SOX.4.2.1.5''']] The UNIX operating application has a session "Time-Out" function enabled.<br> ...
    7 KB (895 words) - 13:44, 23 June 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.2.1.5.5:|'''SOX.2.1.5.5''']] The IDS-IPS operating application has a session "Time-Out" function enabled.<br> ...
    7 KB (901 words) - 13:44, 23 June 2006
  • :a. SOX.4.2.1.9: The UNIX operating system application has forensic auditing enabled to enable the monitoring of admin ...otification message produced by the system being tested to verify that the security administrators are being proactively notified of possible access violations ...
    3 KB (422 words) - 00:09, 13 June 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.2.1.4.5:|'''SOX.2.1.4.5''']] The SWITCH operating application has a session "Time-Out" function enabled.<br> ...
    7 KB (901 words) - 13:43, 23 June 2006
  • Implement internal control, security and audit ability measures during configuration, integration and maintenanc ...tection or Prevention System|'''3.2.1.5: Intrusion Detection or Prevention System''']]<br> ...
    1 KB (146 words) - 17:19, 7 June 2006
  • Controls provide reasonable assurance that IT components, as they relate to security, processing and availability, are well protected, would prevent any unautho ...ensing details. A baseline of configuration items should be kept for every system and service as a checkpoint to which to return after changes. ...
    4 KB (506 words) - 18:44, 25 June 2006
  • ...lidate security. Remember, it only takes one hole to compromise the entire security model. The areas covered are just a portion of the constant and never-endin ...ch one to use should be carefully determined by the environment, operating system, and purpose of the DB2 server.<br> ...
    4 KB (644 words) - 14:43, 15 May 2007
  • '''DS 11.6 Security Requirements for Data Management '''<br> Establish arrangements to identify and apply security requirements applicable to the receipt, processing, physical storage and ou ...
    5 KB (649 words) - 18:23, 5 May 2006
  • A '''privilege''' in a computer system is a permission to perform an action. Examples of various privileges includ ...an action. For example, on systems where people are required to log into a system to use it, logging out will not require a privilege. Systems that do not i ...
    2 KB (341 words) - 18:37, 14 June 2007
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)