Search results
Jump to navigation
Jump to search
Page title matches
- As a career security practitioner and Chief Security Officer to several companies over the years, my significant responsibility ...focused on helping you understanding the core elements of a successful IT security risk management program for a commercial enterprise, the processes of calcu ...23 KB (3,630 words) - 10:19, 27 October 2012
- =='''Best Practices Security Incident Response Program Presentation'''== ::Information Security Staff ...2 KB (315 words) - 18:46, 25 September 2006
- ==Sample Information Security Program Charter== ...tandards provide more measurable guidance in each policy area. Information Security procedures describe how to implement the standards. ...2 KB (316 words) - 15:19, 13 January 2014
- =='''Sample Security Awareness Accessibility Standard'''== ...f the [[Sample Information Security Program Charter:|'''Sample Information Security Program Charter''']] and associated policies and standards.<br> ...5 KB (728 words) - 14:07, 1 May 2010
- =='''Sample Third Party Security Awareness Standard'''== ...f the [[Sample Information Security Program Charter:|'''Sample Information Security Program Charter''']] and associated policies and standards.<br> ...10 KB (1,206 words) - 14:05, 1 May 2010
- ==Sample Employee Ongoing Security Awareness Standard== ...and provides specific instructions and requirements for providing ongoing security awareness education and training for Company employees. ...2 KB (275 words) - 17:10, 23 January 2014
- =='''Sample Management Security Awareness Standard'''== ...specific standards for the education and communication of the Information Security Program Charter and associated policies and standards.<br> ...5 KB (662 words) - 17:54, 25 July 2006
- ...controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> :*'''[[Security Policy:|'''Security Policy''']]<br> ...8 KB (1,023 words) - 17:25, 24 October 2006
- 4 KB (507 words) - 14:58, 21 January 2014
- Users' Security Handbook The Users' Security Handbook is the companion to the Site Security ...75 KB (10,622 words) - 14:38, 3 April 2007
- '''Security Best Practices and Addressing Regulatory Mandates Awareness Testing Templat '''True or False: Security can be communicated, taught, or measured effectively without policy.'''<br> ...2 KB (318 words) - 16:08, 3 August 2006
- ==Sample Information Systems and Technology Security Policy== This Information Systems and Technology Security Policy define Company objectives for establishing specific standards on the ...4 KB (465 words) - 15:46, 13 January 2014
- '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> ...> to gauge and promote end-user awareness of managing risk with the use of security processes.<br> ...2 KB (305 words) - 17:31, 3 August 2006
- '''Security Best Practices and Addressing Regulatory Mandates Awareness Testing Templat '''True or False: Security can be communicated, taught, or measured effectively without policy.'''<br> ...2 KB (322 words) - 16:10, 3 August 2006
- '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> ...> to gauge and promote end-user awareness of managing risk with the use of security processes.<br> ...2 KB (309 words) - 17:34, 3 August 2006
- ==Use of computer security consultants, EDP auditors, and computer professionals== ...ssional organization for security professionals is the Information Systems Security Association.[[FN36]] ...2 KB (298 words) - 15:17, 22 February 2009
Page text matches
- ==Use of computer security consultants, EDP auditors, and computer professionals== ...ssional organization for security professionals is the Information Systems Security Association.[[FN36]] ...2 KB (298 words) - 15:17, 22 February 2009
- '''10. Risk: Reactive security monitoring results in data compromise and financial loss or liability.'''<b :a. SOX.4.2.1.10: UNIX administration team is notified when security violations occur.<br> ...3 KB (421 words) - 20:20, 12 June 2006
- ...ded to create, implement, and maintain a risk management-based Information Security Program that complies with SOX Section 404.<br> ...andards) that are needed to create, implement, and maintain an Information Security Program that complies with SOX Section 404.<br> ...1 KB (204 words) - 13:03, 14 July 2006
- ==Sample Security Awareness Standard== ...ation of the [[Sample Information Security Program Charter:|'''Information Security Program Charter''']]. and associated policies, standards, guidelines, and p ...3 KB (418 words) - 19:53, 14 January 2014
- :'''Assign to an individual or team the following information security management responsibilities:'''<br> ...security policies and procedures to verify that the following information security responsibilities are specifically and formally assigned: ...2 KB (294 words) - 20:02, 2 March 2007
- ...tion in a Public World 48-56 (1995) (hereinafter "Kaufman, et al., Network Security"). ...230 bytes (29 words) - 12:38, 16 October 2014
- ==Sample Information Security Program Charter== ...tandards provide more measurable guidance in each policy area. Information Security procedures describe how to implement the standards. ...2 KB (316 words) - 15:19, 13 January 2014
- :'''Assign to an individual or team the following information security management responsibilities:'''<br> ...security policies and procedures to verify that the following information security responsibilities are specifically and formally assigned: ...2 KB (293 words) - 16:04, 2 March 2007
- ...licies and procedures and determine that they include procedures to review security logs at least daily, and that follow-up to exceptions is required. ...380 bytes (54 words) - 15:24, 21 February 2007
- ...security practices for such systems. It requires the creation of computer security plans, and the appropriate training of system users or owners where the sys It has been superseded by the [[FISMA | Federal Information Security Management Act of 2002]] ...1 KB (168 words) - 11:37, 23 May 2010
- ...ver authorization, authentication, nonrepudiation, data classification and security monitoring may result in inaccurate financial reporting.''' ...and logs security activity at the application and database, and identified security violations are reported to senior management. ...2 KB (321 words) - 18:06, 25 June 2006
- ...years of testing and debugging, and while they may provide a great deal of security, they typically have no way to guarantee that a new bug or exploit won't be ...ty through obscurity|rely on being secret]]. It is not mandatory, but good security usually means that everyone is allowed to know and understand the design, ' ...2 KB (343 words) - 18:39, 14 June 2007
- ...ver authorization, authentication, nonrepudiation, data classification and security monitoring may result in inaccurate financial reporting.''' :::a. [[SOX.2.0.17:|'''SOX.2.0.17''']] An information security policy exists and has been approved by an appropriate level of executive ma ...3 KB (351 words) - 16:49, 25 June 2006
- *[[Security engineering]] [[Category:Security]] ...1 KB (170 words) - 16:06, 14 June 2007
- '''DS 5.1 Management of IT Security'''<br> ...rity at the highest appropriate organizational level, so the management of security actions is in line with business requirements. ...3 KB (394 words) - 17:12, 22 March 2007
- =='''Sample Management Security Awareness Standard'''== ...specific standards for the education and communication of the Information Security Program Charter and associated policies and standards.<br> ...5 KB (662 words) - 17:54, 25 July 2006
- ...c attention to communicating IT security awareness and the message that IT security is everyone’s responsibility.<br> ...f, information asset owners, etc.) are not informed of or trained in their security responsibilities.'''<br> ...3 KB (442 words) - 18:58, 1 May 2006
- :'''Ensure the security policy and procedures clearly define information security responsibilities for all employees and contractors.'''<br> ...4:''' Verify that information security policies clearly define information security responsibilities for both employees and contractors. ...2 KB (265 words) - 15:58, 2 March 2007
- ...ific objectives required to create, implement, and maintain an Information Security Program that complies with HIPAA (Subpart C Sections 164.308, 164.310, 164. ...[[Sample_Information_Security_Program_Charter:|'''Sample HIPAA Information Security Program Charter''']]<br> ...5 KB (614 words) - 16:46, 25 July 2006
- ...ific objectives required to create, implement, and maintain an Information Security Program that complies with GLBA (Interagency Guidelines). Also, additional ...[[Sample Information Security Program Charter:|'''Sample GLBA Information Security Program Charter''']]<br> ...4 KB (535 words) - 16:51, 25 July 2006