Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...from those budgeted and amount of specialization of the software planned. Risks that affect revenues can be unanticipated competition, privacy, intellectua ...arch and development expenditures can lead both business and technological risks since specialization does not lead to lower unit costs of software (Rao & K ...
    1 KB (215 words) - 18:32, 13 April 2007
  • ...selves to insurance carriers. Coverage is increasingly available to cover risks from security breaches or denial of service attacks. Several insurance com :* Availability, cost, and covered risks vary by insurance company. ...
    3 KB (469 words) - 13:30, 10 April 2007
  • ...ior management on the appetite for IT risk and approval of any residual IT risks.<br> ...
    3 KB (370 words) - 18:04, 1 May 2006
  • ...ling the areas or events that have the potential to cause unwanted change. Risks faced by the project management process and the project deliverable should ....17:|'''SOX.1.17''']] Controls provide reasonable reassurance that project risks are managed.<br> ...
    3 KB (403 words) - 12:37, 23 June 2006
  • ...technology involves more than containing costs and controlling operational risks. An institution capable of aligning its IT infrastructure to support its bu ...information. Changes in technology may not only introduce new operational risks to manage, but can also introduce an institution to increased risk to its r ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ...t should be aimed at maximizing success of value delivery while minimizing risks to information assets through preventive measures, timely identification of ...
    2 KB (331 words) - 18:47, 1 May 2006
  • ...arranged, responsibilities reassigned and access rights removed such that risks are minimized and continuity of the function is guaranteed.<br> ::'''1. Risk: Terminated entities create unacceptable control risks to the Company.'''<br> ...
    3 KB (366 words) - 16:39, 26 June 2006
  • ...as part of the organization’s process for the development of requirements. Risks include threats to data integrity, security, availability, [[Privacy | priv ...
    2 KB (269 words) - 23:52, 14 June 2007
  • This section provides a series of presentations that cover emerging security risks and topics of interest. Your organization can use and tailor these presenta ...resentation on executive management awareness covers security and business risks, anatomy of an attack, and a security risk discussion exercise.<br> ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...agement should identify, measure, control, and monitor technology to avoid risks that threaten the safety and soundness of an institution.<br> The risk identification and management process for technology-related risks is not complete without consideration of the overall IT environment in whic ...
    4 KB (528 words) - 16:58, 28 March 2010
  • ...nes the risks the client faces in going to trial, and compares them to the risks if a guilty plea or a plea of no contest is entered. Counsel may even prese ...
    3 KB (603 words) - 17:57, 22 February 2009
  • ...entation risks and addressed all the necessary components to address these risks, e.g., if the completeness and accuracy of system interfaces were essential ...
    3 KB (475 words) - 13:09, 23 June 2006
  • ...[[SOX.2.0.14:|'''SOX.2.0.14''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in t ...
    2 KB (294 words) - 18:21, 14 June 2006
  • :::a. [[SOX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in t ...
    2 KB (291 words) - 16:02, 25 June 2006
  • ...ment process, and may also be the most difficult and prone to error. Once risks have been identified and assessed, the steps to properly deal with them are .../benefit analysis; individual risks are of more use for evaluating whether risks to individuals are "acceptable". ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'''<br> ...
    2 KB (295 words) - 15:40, 25 June 2006
  • ...or FTP as alternatives, resulting in higher costs and/or greater security risks. ...
    961 bytes (140 words) - 22:16, 15 March 2010
  • ===Identification of risks related to external parties=== Risks to the organization's information and information processing facilities fro ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ===Risks of Metadata=== ...
    4 KB (587 words) - 22:52, 15 March 2010
  • ...that empowers the Program to manage Information Security-related business risks.<br> ...
    2 KB (202 words) - 12:40, 15 June 2007
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)