All pages
Jump to navigation
Jump to search
- Risk mitigation
- Russian copulation
- SAS 70
- SB-1386
- SOX.1.1.1:
- SOX.1.1:
- SOX.1.22:
- SOX.1.23:
- SOX.1.24:
- SOX.1.25:
- SOX.1.2:
- SOX.1.3:
- SOX.1.5:
- SOX.1.7:
- SOX.2.0.11:
- SOX.2.0.12:
- SOX.2.0.13:
- SOX.2.0.14:
- SOX.2.0.15:
- SOX.2.0.16:
- SOX.2.0.17:
- SOX.2.0.18:
- SOX.2.0.19:
- SOX.2.0.20:
- SOX.2.0.21:
- SOX.2.0.22:
- SOX.2.0.23:
- SOX.2.0.24:
- SOX.2.0.25:
- SOX.2.0.26:
- SOX.2.0.27:
- SOX.2.0.28:
- SOX.2.0.29:
- SOX.2.0.30:
- SOX.2.0.31:
- SOX.2.0.32:
- SOX.2.0.5:
- SOX.2.0.6:
- SOX.2.0.7:
- SOX.2.0.8:
- SOX.2.3.4:
- SOX.2.7.10:
- SOX.2.7.11:
- SOX.2.7.12:
- SOX.2.7.13:
- SOX.2.7.14:
- SOX.2.7.15:
- SOX.2.7.16:
- SOX.2.7.17:
- SOX.2.7.6:
- SOX.2.7.7:
- SOX.2.7.8:
- SOX.2.7.9:
- SOX.4.2.1.10:
- SOX.4.2.1.7:
- SOX.4.2.1.8:
- SOX.4.2.1.9:
- SOX.4.2.4.15:
- SOX.4.4.8:
- SOX.5.1.13:
- SOX.6.1.1:
- SOX.6.1.4:
- SOX.6.1.5:
- SOX Policy References:
- SSAE 16
- Sample Acceptable Use Policy:
- Sample Access Control Standard:
- Sample Anti-Virus Standard:
- Sample Asset Identification and Classification Policy:
- Sample Asset Identification and Classification Standard:
- Sample Asset Information Handling Standard
- Sample Asset Management Policy:
- Sample Asset Protection Policy:
- Sample Asset Protection Standard:
- Sample Asset Protection Standards:
- Sample Auditing Standard:
- Sample Availability Protection Standard:
- Sample BYOD Acceptable Use Standard:
- Sample Change Control Standard:
- Sample Configuration Management Standard:
- Sample Electronic Fraud Prevention Guidelines:
- Sample Electronic Mail Acceptable Use Standard:
- Sample Encryption Standard:
- Sample Incident Response Standard:
- Sample Information Classification Standard:
- Sample Information Handling Standard:
- Sample Information Labeling Standard:
- Sample Information Security Program Charter:
- Sample Information Systems and Technology Security Policy:
- Sample Integrity Protection Standard:
- Sample Internet Acceptable Use Policy:
- Sample Legal Hold Standards:
- Sample Life Cycle Management Standard:
- Sample Management Awareness Standard:
- Sample Management Security Awareness Standard:
- Sample Misuse Reporting Standard:
- Sample New Hire Security Awareness Standard:
- Sample On Premise Wireless Access Technology Guideline
- Sample Ongoing Security Awareness Standard:
- Sample Physical Access Standard:
- Sample Protection Standards:
- Sample Remote Access Standard:
- Sample Security Awareness Accessibility Standard:
- Sample Security Awareness Policy:
- Sample Software Acceptable Use Standard:
- Sample System Development Life Cycle Standard:
- Sample Telecommunication Acceptable Use Standard:
- Sample Third Party Security Awareness Standard:
- Sample Threat Assessment Standard:
- Sample Threat Assessment and Monitoring Policy:
- Sample Threat Monitoring Standard:
- Sample Vulnerability Assessment Standard:
- Sample Vulnerability Assessment and Management Policy:
- Sample Vulnerability Management Standard:
- Sarbanes-Oxley
- Sarbanes-Oxley Policy Samples:
- Scenario analysis
- Search and Seizure Appendices
- Search and Seizure Introduction
- Search and Seizure Preface and Acknowledgments
- Searching and Seizing Computers
- Searching and Seizing Computers With a Warrant
- Searching and Seizing Computers Without a Warrant
- Searching and Seizing Computers and Obtaining Electronic Evidence Manual
- Seating arrangement in courtroom
- Security Audit Procedures
- Security Best Practices and Addressing Regulatory Mandates Testing Template:
- Security Best Practices and Addressing Regulatory Mandates Testing Template (Answer Key):
- Security Freeze
- Security Management:
- Security Policy:
- Security by design
- Security through obscurity
- Selected Defamation Defenses
- Selecting the Jury in general
- Sentencing hearing—illustrative argument and response
- Separate trial
- Service Desk Management:
- Service Level Agreement
- Service Level Management:
- Service Provider Oversight
- Sitesupport-url
- Social Computing Guidelines
- Software Configuration Management
- Sovereignty
- Spam
- State Attempts At Regulation
- State Child pornography legislation
- State Child protection legislation; solicitation and importuning
- State Laws in general
- State consumer protection laws
- Statute of limitations
- Statutory Protections
- Strategy
- Subjects of discovery; checklist
- Sustainable Risk Reduction Through Information Security Process Test Template (Answer Key):
- Sustainable Risk Reduction Through Information Security Process Testing Template:
- Systems Development and Maintenance:
- TR-39 Audit
- Table formatting help
- Taking of information
- Tape recording initial client interview
- Testing Templates:
- Texas DOI:
- Text formatting help
- The Copyright Act
- The Defense of a Computer Crime Case
- The HIPAA Security and the Risk Dilemma:
- The Stored Communications Act
- The Wiretap Act (Title III)
- The possibility of restitution
- Timing of plea bargain request
- Tools:
- Trade secret statutes
- Trademark
- Trademark Links, Frames, Search Engines And Meta-Tags
- Trademark in General
- Trademark of Domain Names
- Trespass
- Trial brief
- USAM 9-7.111
- USAM 9-7.200
- USA PATRIOT Act
- USC 18 1030
- USC 2701
- Uncertainty as to applicability of the law
- Uncertainty as to effect of case on a jury
- Uniform Computer Information Transactions Act
- Uniform Electronic Transactions Act
- Use of computer security consultants, EDP auditors, and computer professionals
- Use of computer services; larceny
- Use of discovery
- Use of independent laboratory tests
- Use of photographs and motion pictures
- Use of private investigators
- User’s Security Handbook -- RFC 2504 February 1999
- Using electronically obtained evidence
- Venue
- Violation of privacy
- Voir-dire questions checklist
- Waiver or assertion of right to speedy trial
- Web Application Auditing:
- Why you need an intelligent file transfer solution.
- Wisconsin DOI:
- Witness preparation—Expert witnesses
- Witness preparation—in general
- Witnesses testifying as to documents
- Zero-day exploit