Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • Alabama Computer Crime Act — Ala. Code §§ 13A-8-100 to 13A-8-103 Colo. Rev. Stat. tit. 18, art. 5.5 — Computer crime<br> ...
    9 KB (1,358 words) - 22:11, 5 September 2011
  • ...rs shall abide by and comply with any and all copyright laws pertaining to computer software and by any software license agreements that are legally applicable The Chief Information Security Officer (CISO) approves the Software Acceptable Use Standard. The CISO also ...
    7 KB (953 words) - 14:13, 1 May 2010
  • ==Computer Fraud and Abuse Act== ...hes anyone who not just commits or attempts to commit an offense under the Computer Fraud and Abuse Act but also those who conspire to do so.<br> ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • :'''(1)''' having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such :'''(2)''' intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains--<b ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • ...am development, '''''program change''''', access to programs and data, and computer operations, which are periodically reviewed, updated and approved by manage ISO 8.1 Operational procedures and responsibilities 10.5 Security in development and support processes. ...
    4 KB (537 words) - 13:57, 23 June 2006
  • ...oftware and hardware, is relatively easy to implement, and requires little computer memory. As a new encryption standard, it is currently being deployed on a l ...e state; it cyclically shifts the bytes in each row by a certain [[Offset (computer science)|offset]]. For AES, the first row is left unchanged. Each byte of t ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ...software is available. When a system needs hardware or software upgrade, a computer technician can access the configuration management program and database to ...ount management]], [[fault management]], [[performance management]], and [[security management]].<br> ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produc ...bility study through maintenance of the completed application. Verify that security, availability, and process integrity requirements are included.<br> ...
    6 KB (863 words) - 13:12, 23 June 2006
  • :1. physical access, e.g. to offices, computer rooms, filing cabinets; ...or the continuation of external party access in the case of an information security incident; ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ## Virus detection shall not be disabled on any computer resources equipped with anti-virus protection. ...tware upgrades shall be expedited, as necessary, to effectively respond to security advisories or findings from assessment and monitoring activities. ...
    5 KB (765 words) - 20:00, 15 January 2014
  • :* Replicate itself within a computer and transmit itself between computers. :* Host hardening, including patch application and security-minded configurations of the operating system (OS), browsers, and other net ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ...ations where the terminology is similar. For example, from the information security point of view, "digital signature" means the result of applying to specific ...These Guidelines use "digital signature" only as it is used in information security terminology, as meaning the result of applying the technical processes desc ...
    22 KB (3,420 words) - 15:18, 3 April 2007
  • ...took the premise and integrated the Security Trifecta philosophy of cyber security with Governance, Technology and Vigilance. The process is technically relia ...r the natural rhythm of the process being audited, including the timing of computer and business processes as well as the timing and availability of auditors t ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...force the security controls we need to comply with the companies corporate security policy.<br> * Authorization and user security administration ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...veryday life; examples include security of automated teller machine cards, computer passwords, and electronic commerce all depend on cryptography. ...ccessive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and m ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • :* Information Security :* SP-10; Control And Security Risks in Electronic Imaging Systems, December 1993<br> ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...PATRIOT Act, the Homeland Security Act and other laws focused on national security, Congress has been active in changing the legal landscape for access to rea ===Computer Fraud and Abuse Act=== ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • Users' Security Handbook The Users' Security Handbook is the companion to the Site Security ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • ...collection, use, disclosure and retention of information; and employ data security practices. The European Commission has deemed the PIPED Act “adequate” unde (4) Security of personal data. This principle requires appropriate security measures to be applied to all personal data (including data that is not in ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • ...c Operational Readiness Security Evaluation is a comprehensive information security framework designed to be accessible, extensible, comprehensive, and collabo ...| COBIT]]) is another approach to standardize good information technology security and control practices. This is done by providing tools to assess and measu ...
    12 KB (1,686 words) - 11:47, 30 May 2015
View ( | ) (20 | 50 | 100 | 250 | 500)