Pages with the most revisions
Jump to navigation
Jump to search
Showing below up to 500 results in range #51 to #550.
- AI6.3: (10 revisions)
- Business continuity planning (10 revisions)
- Compliance: (10 revisions)
- Sample Encryption Standard: (10 revisions)
- PCI: (9 revisions)
- Sample Configuration Management Standard: (9 revisions)
- Corporate governance (9 revisions)
- SOX.2.3.4: (9 revisions)
- DS11.2: (9 revisions)
- PCI 3: (9 revisions)
- Encryption (9 revisions)
- Enterprise Open-Source Policy Sample: (9 revisions)
- Sample Availability Protection Standard: (9 revisions)
- Microsoft SQL Database Asset Protection Standards: (8 revisions)
- PCI 1: (8 revisions)
- Social Computing Guidelines (8 revisions)
- Presentations: (8 revisions)
- SOX.2.0.17: (8 revisions)
- Asset Management: (8 revisions)
- PCI 4: (8 revisions)
- Basel 2 (8 revisions)
- DS2.3: (8 revisions)
- Kentucky DOI: (8 revisions)
- Disaster Recovery Requirements Analysis (8 revisions)
- PO10.3: (8 revisions)
- PO4.3: (8 revisions)
- PO4.1: (8 revisions)
- SOX.2.0.16: (8 revisions)
- SOX.2.0.12: (8 revisions)
- SOX.6.1.4: (8 revisions)
- Sample Asset Management Policy: (8 revisions)
- Sample Asset Identification and Classification Standard: (8 revisions)
- Sample Electronic Mail Acceptable Use Standard: (8 revisions)
- Sample Information Systems and Technology Security Policy: (8 revisions)
- Monitor and Evaluate: (8 revisions)
- ISO 20000 (8 revisions)
- 12 USC 3407 (7 revisions)
- Sample New Hire Security Awareness Standard: (7 revisions)
- AI2.7: (7 revisions)
- Awareness-training (7 revisions)
- Best Practices Research Reports: (7 revisions)
- Communications and Operations Management: (7 revisions)
- Research (7 revisions)
- Risk assessment (7 revisions)
- Continuous auditing (7 revisions)
- DS10.1: (7 revisions)
- SOX.2.0.11: (7 revisions)
- Internet Law Treatise (7 revisions)
- SOX.2.7.16: (7 revisions)
- Sample Incident Response Standard: (7 revisions)
- Sample Security Awareness Policy: (7 revisions)
- Sample Threat Assessment Standard: (7 revisions)
- GLBA: (7 revisions)
- Microsoft Operations Framework (7 revisions)
- Net Neutrality (7 revisions)
- Information Security booklet (7 revisions)
- 12 CFR 205.13 (6 revisions)
- 12 CFR 226.25 (6 revisions)
- 12 CFR 230.9 (6 revisions)
- 15 (6 revisions)
- 16 (6 revisions)
- 17 (6 revisions)
- 19 (6 revisions)
- 2 (6 revisions)
- AI2.10: (6 revisions)
- Trademark (6 revisions)
- Audit Guidance Examination Procedures (6 revisions)
- Padding (cryptography) (6 revisions)
- PO8.3: (6 revisions)
- Physical and Environmental Security: (6 revisions)
- Risk management plan (6 revisions)
- Corporate Governance (6 revisions)
- Security Audit Procedures (6 revisions)
- Department of Insurance: (6 revisions)
- PO8.2: (6 revisions)
- SOX.2.0.13: (6 revisions)
- Sample Anti-Virus Standard: (6 revisions)
- Sample Remote Access Standard: (6 revisions)
- Forensic Education Resources: (6 revisions)
- Legal-Technology White Papers (6 revisions)
- '''Information Technology Risk Calculator''' (5 revisions)
- 12 (5 revisions)
- 12 CFR 229.21 g (5 revisions)
- 12 USC 3406 (5 revisions)
- 18 USC 2701 (5 revisions)
- 20 (5 revisions)
- 21 (5 revisions)
- PCI-1.3.2: (5 revisions)
- AI2.8: (5 revisions)
- References: (5 revisions)
- SOX.1.3: (5 revisions)
- Sample Asset Information Handling Standard (5 revisions)
- AI6.5: (5 revisions)
- Testing Templates: (5 revisions)
- PCI-1.3.4: (5 revisions)
- Capability Maturity Model (5 revisions)
- Computer Fraud and Abuse Act (CFAA) (5 revisions)
- Physical and Environmental Protection (5 revisions)
- SOX.2.0.15: (5 revisions)
- SOX.2.0.14: (5 revisions)
- SSAE 16 (5 revisions)
- Cryptography (5 revisions)
- DS1.1: (5 revisions)
- Sample Management Awareness Standard: (5 revisions)
- Sample Life Cycle Management Standard: (5 revisions)
- DS12.3: (5 revisions)
- DS2.4: (5 revisions)
- PCI-1.2.1: (5 revisions)
- PO4.10: (5 revisions)
- E-Banking Booklet (5 revisions)
- Uniform Electronic Transactions Act (5 revisions)
- SOX.2.0.6: (5 revisions)
- SOX.5.1.13: (5 revisions)
- Sample Acceptable Use Policy: (5 revisions)
- Sample Auditing Standard: (5 revisions)
- Sample Ongoing Security Awareness Standard: (5 revisions)
- Security Policy: (5 revisions)
- Identity theft (5 revisions)
- Implementation (5 revisions)
- 1 (4 revisions)
- 10 (4 revisions)
- 11 (4 revisions)
- 13 (4 revisions)
- 14 (4 revisions)
- 18 (4 revisions)
- 22 (4 revisions)
- 23 (4 revisions)
- Sample Information Handling Standard: (4 revisions)
- PO9.1: (4 revisions)
- Privacy Laws in Mexico (4 revisions)
- Sample Physical Access Standard: (4 revisions)
- PCI-1.1.2: (4 revisions)
- AI2.5: (4 revisions)
- AI3.1: (4 revisions)
- AI5.1: (4 revisions)
- AI6.2: (4 revisions)
- Software Configuration Management (4 revisions)
- PCI-1.3.1: (4 revisions)
- PCI-10.3.1: (4 revisions)
- Recommended Links: (4 revisions)
- Configuration Management: (4 revisions)
- SOX.1.1.1: (4 revisions)
- DS11.6: (4 revisions)
- DS13.1: (4 revisions)
- North Carolina Identity Theft Protection Act of 2005 (4 revisions)
- DS2.1: (4 revisions)
- DS2.2: (4 revisions)
- DS3.4: (4 revisions)
- DS4.1: (4 revisions)
- DS4.4: (4 revisions)
- DS4.9: (4 revisions)
- DS5.3: (4 revisions)
- DS9.1: (4 revisions)
- DS9.2: (4 revisions)
- Data Security (4 revisions)
- PCI 5: (4 revisions)
- Delivery and Support: (4 revisions)
- PO1.2: (4 revisions)
- Development and Acquisition Booklet (4 revisions)
- PO5.5: (4 revisions)
- PO4.11: (4 revisions)
- FERPA (4 revisions)
- SOX.2.0.18: (4 revisions)
- Sample Information Labeling Standard: (4 revisions)
- Sample Threat Assessment and Monitoring Policy: (4 revisions)
- Sample Vulnerability Assessment and Management Policy: (4 revisions)
- HIPAA Policy References: (4 revisions)
- Horsewiki/horsewiki/index.php (4 revisions)
- Organizational Security: (4 revisions)
- PCI-1.1.3: (4 revisions)
- PCI-1.1.5: (4 revisions)
- Information Security Management System (4 revisions)
- Information assurance (4 revisions)
- 12 CFR 229.21 (3 revisions)
- 24 (3 revisions)
- 3.2.1.1: Routers (3 revisions)
- 3.2.1.2: Firewalls (3 revisions)
- 3.2.1.3: VPN (3 revisions)
- 3.2.1.4: Managed Switches (3 revisions)
- 3.2.1.5: Intrusion Detection or Prevention System (3 revisions)
- 3.2.2.2: Windows (3 revisions)
- SOX.1.22: (3 revisions)
- SOX.2.7.11: (3 revisions)
- PCI-1.3.5: (3 revisions)
- PCI-1.2.2: (3 revisions)
- 44 USC 3542 (3 revisions)
- AI1.1: (3 revisions)
- PCI-12.8.3: (3 revisions)
- AI2.2: (3 revisions)
- AI2.6: (3 revisions)
- AI3.3: (3 revisions)
- AI3.4: (3 revisions)
- AI5.3: (3 revisions)
- AI5.4: (3 revisions)
- Sample Telecommunication Acceptable Use Standard: (3 revisions)
- Sample Software Acceptable Use Standard: (3 revisions)
- AI7.12: (3 revisions)
- SOX.4.4.8: (3 revisions)
- AI7.3: (3 revisions)
- AI7.5: (3 revisions)
- PCI-1.3.6: (3 revisions)
- Acquisition and Implementation: (3 revisions)
- PCI-10.4: (3 revisions)
- Availability (3 revisions)
- PCI 9: (3 revisions)
- Backup site (3 revisions)
- Burden of proof (3 revisions)
- Business-IT Alignment (3 revisions)
- Business Continuity Planning Booklet (3 revisions)
- Change Management: (3 revisions)
- Change control (3 revisions)
- PO9.3: (3 revisions)
- PO6.1: (3 revisions)
- Cleartext (3 revisions)
- Privacy Laws in Honduras (3 revisions)
- RED/BLACK concept (3 revisions)
- Privacy Laws in Canada (3 revisions)
- Recovery Point Objective (3 revisions)
- SOX.1.1: (3 revisions)
- SOX.2.0.23: (3 revisions)
- Configuration Mangement: (3 revisions)
- SOX.2.0.21: (3 revisions)
- Continuity Management: (3 revisions)
- Sample Vulnerability Assessment Standard: (3 revisions)
- Service Provider Oversight (3 revisions)
- DS11.4: (3 revisions)
- DS11.5: (3 revisions)
- DS12.2: (3 revisions)
- ME4.3: (3 revisions)
- PCI-1.1.6: (3 revisions)
- PCI-1.3.3: (3 revisions)
- PCI-1.2.3: (3 revisions)
- DS4.6: (3 revisions)
- DS5.10: (3 revisions)
- PCI-10.2.1: (3 revisions)
- PCI-1.3.8: (3 revisions)
- DS5.5: (3 revisions)
- DS6.4: (3 revisions)
- PCI-1.3.7: (3 revisions)
- DS8.1: (3 revisions)
- DS9.3: (3 revisions)
- PCI-6.3.1: (3 revisions)
- PCI-9.1.2: (3 revisions)
- PCI 6: (3 revisions)
- PCI-9.3.1: (3 revisions)
- Discovery in general (3 revisions)
- PO2.3: (3 revisions)
- PO1.4: (3 revisions)
- PO6.4: (3 revisions)
- PO7.8: (3 revisions)
- FN2 (3 revisions)
- SOX.1.25: (3 revisions)
- Recovery Consistency Objective (3 revisions)
- Personnel Security: (3 revisions)
- SOX.4.2.1.7: (3 revisions)
- SOX.2.7.9: (3 revisions)
- Sample Asset Protection Standards: (3 revisions)
- Sample Change Control Standard: (3 revisions)
- SOX.2.0.26: (3 revisions)
- Sample Internet Acceptable Use Policy: (3 revisions)
- FOIA (3 revisions)
- Sample System Development Life Cycle Standard: (3 revisions)
- Financial Management: (3 revisions)
- GLBA Policy References: (3 revisions)
- Security through obscurity (3 revisions)
- Security by design (3 revisions)
- Personally identifiable information (3 revisions)
- Gramm-Leach-Bliley: (3 revisions)
- Health Insurance Portability and Accountability: (3 revisions)
- Malicious Code Prevention (3 revisions)
- IT Change Management (3 revisions)
- PCI-1.1.1: (3 revisions)
- PCI-1.1.4: (3 revisions)
- Information Systems Acquisition, Development and Maintenance: (3 revisions)
- Sample Threat Monitoring Standard: (2 revisions)
- Quality assurance (2 revisions)
- PCI-3.1 (2 revisions)
- PO10.9: (2 revisions)
- 3.2.2.4: OS/400 (2 revisions)
- PO4.7: (2 revisions)
- PO10.2: (2 revisions)
- ME1.2: (2 revisions)
- Right of Publicity (2 revisions)
- Requests (2 revisions)
- Proving computer theft (2 revisions)
- SOX.2.7.13: (2 revisions)
- 44 USC 3501 (2 revisions)
- 44 USC 3501-3549 (2 revisions)
- Sarbanes-Oxley Policy Samples: (2 revisions)
- Privacy Laws in United States (2 revisions)
- PCI-1.1.7: (2 revisions)
- PCI-10.2.6: (2 revisions)
- PCI-10.2.4: (2 revisions)
- PCI-1.4.1: (2 revisions)
- PCI-10.3.5: (2 revisions)
- PCI-10.5.5: (2 revisions)
- PCI-10.5.1: (2 revisions)
- PCI-10.3.4: (2 revisions)
- PCI-1.4: (2 revisions)
- PCI-2.2.3: (2 revisions)
- AI1.2: (2 revisions)
- AI2.1: (2 revisions)
- AI2.3: (2 revisions)
- AI2.4: (2 revisions)
- AI2.9: (2 revisions)
- AI4.2: (2 revisions)
- Plaintext (2 revisions)
- SOX.2.7.10: (2 revisions)
- Sample Legal Hold Standards: (2 revisions)
- AI6.4: (2 revisions)
- AI7.6: (2 revisions)
- AI7.7: (2 revisions)
- PCI-1.1.9: (2 revisions)
- PCI-1.3.10: (2 revisions)
- PCI-1.1.8: (2 revisions)
- Logical Security (2 revisions)
- PCI-1.3: (2 revisions)
- PCI-10.2.3: (2 revisions)
- PCI-10.2.7: (2 revisions)
- PCI-10.2.2: (2 revisions)
- PCI-10.1: (2 revisions)
- Anti-cybersquatting Consumer Protection Act (2 revisions)
- PCI-10.3.3: (2 revisions)
- PCI-1.5: (2 revisions)
- ME2.1: (2 revisions)
- PCI-6.5.1: (2 revisions)
- PCI-12.9.1: (2 revisions)
- PCI-12.7: (2 revisions)
- PO3.2: (2 revisions)
- PO10.1: (2 revisions)
- PO7.6: (2 revisions)
- PO7.1: (2 revisions)
- PO4.5: (2 revisions)
- Character witnesses (2 revisions)
- PO10.11: (2 revisions)
- PCI-3.4 (2 revisions)
- ME1.4: (2 revisions)
- Communications Decency Act (2 revisions)
- Privilege (computer science) (2 revisions)
- Computer network (2 revisions)
- Recovery Time Objective (2 revisions)
- SOX.1.23: (2 revisions)
- SOX.1.2: (2 revisions)
- SOX.2.7.14: (2 revisions)
- SOX.2.7.12: (2 revisions)
- DB2 Database Asset Protection Standards: (2 revisions)
- Sample Third Party Security Awareness Standard: (2 revisions)
- DS1.3: (2 revisions)
- DS1.4: (2 revisions)
- DS1.5: (2 revisions)
- DS1.6: (2 revisions)
- DS10.2: (2 revisions)
- DS11.3: (2 revisions)
- Libel (2 revisions)
- Jurisdiction (2 revisions)
- Outline of issues involving search and seizure—Pursuant to warrant (2 revisions)
- DS1: (2 revisions)
- PCI-1.4.2: (2 revisions)
- DS3: (2 revisions)
- DS4.10: (2 revisions)
- DS4.2: (2 revisions)
- DS4.3: (2 revisions)
- DS4.5: (2 revisions)
- PCI-1.3.9: (2 revisions)
- PCI-10.2.5: (2 revisions)
- DS4: (2 revisions)
- DS5.1: (2 revisions)
- PCI-10.5.4: (2 revisions)
- PCI-10.5.2: (2 revisions)
- PCI-10.3.6: (2 revisions)
- DS5.9: (2 revisions)
- DS5: (2 revisions)
- DS6.1: (2 revisions)
- DS6.2: (2 revisions)
- DS6.3: (2 revisions)
- PCI-10.3.2: (2 revisions)
- DS7.1: (2 revisions)
- DS7.2: (2 revisions)
- DS7.3: (2 revisions)
- DS8.2: (2 revisions)
- DS8.3: (2 revisions)
- DS8.4: (2 revisions)
- DS8.5: (2 revisions)
- KY DOI A.1: (2 revisions)
- PCI-2.3: (2 revisions)
- DS:2 (2 revisions)
- PCI-12.9.2: (2 revisions)
- PCI-12.1.2: (2 revisions)
- PCI-8.5.5: (2 revisions)
- PCI-7.1: (2 revisions)
- PCI-9.10.2: (2 revisions)
- PCI-9.1.3: (2 revisions)
- PCI-9.1.1: (2 revisions)
- PCI-4.1.1: (2 revisions)
- PCI-12.1.1: (2 revisions)
- PCI-9.3.2: (2 revisions)
- PCI 8: (2 revisions)
- Department of Defense Information Assurance Certification and Accreditation Process (2 revisions)
- PCI 7: (2 revisions)
- PCI-11.5: (2 revisions)
- PO10.6: (2 revisions)
- PO2.2: (2 revisions)
- PO1.6: (2 revisions)
- PO3.3: (2 revisions)
- PO3.1: (2 revisions)
- PO3.4: (2 revisions)
- Electronic Signatures in Global and National Commerce Act (2 revisions)
- PO7.4: (2 revisions)
- PO6.3: (2 revisions)
- PO1.3: (2 revisions)
- PCI-10.6: (2 revisions)
- SOX.1.5: (2 revisions)
- FN1 (2 revisions)
- FN10 (2 revisions)
- FN11 (2 revisions)
- FN12 (2 revisions)
- FN13 (2 revisions)
- FN14 (2 revisions)
- FN15 (2 revisions)
- FN16 (2 revisions)
- FN17 (2 revisions)
- FN18 (2 revisions)
- FN19 (2 revisions)
- FN20 (2 revisions)
- FN21 (2 revisions)
- FN22 (2 revisions)
- FN23 (2 revisions)
- FN24 (2 revisions)
- FN25 (2 revisions)
- FN26 (2 revisions)
- FN27 (2 revisions)
- FN28 (2 revisions)
- FN29 (2 revisions)
- FN3 (2 revisions)
- FN30 (2 revisions)
- FN31 (2 revisions)
- FN32 (2 revisions)
- FN33 (2 revisions)
- FN34 (2 revisions)
- FN35 (2 revisions)
- FN36 (2 revisions)
- FN37 (2 revisions)
- FN38 (2 revisions)
- FN39 (2 revisions)
- FN4 (2 revisions)
- FN40 (2 revisions)
- FN41 (2 revisions)
- FN42 (2 revisions)
- FN43 (2 revisions)
- FN44 (2 revisions)
- FN45 (2 revisions)
- FN46 (2 revisions)
- FN47 (2 revisions)
- FN48 (2 revisions)
- FN49 (2 revisions)
- FN5 (2 revisions)
- FN50 (2 revisions)
- FN51 (2 revisions)
- FN52 (2 revisions)
- FN53 (2 revisions)
- FN54 (2 revisions)
- FN55 (2 revisions)
- FN56 (2 revisions)
- SAS 70 (2 revisions)
- FN6 (2 revisions)
- SOX.2.0.22: (2 revisions)
- SOX.2.0.20: (2 revisions)
- Russian copulation (2 revisions)
- SOX.2.7.17: (2 revisions)
- FN69 (2 revisions)
- FN7 (2 revisions)
- SOX.4.2.1.9: (2 revisions)
- SOX Policy References: (2 revisions)
- FN8 (2 revisions)
- SOX.4.2.1.8: (2 revisions)
- SOX.2.0.31: (2 revisions)
- FN9 (2 revisions)
- Sample BYOD Acceptable Use Standard: (2 revisions)
- Sample Misuse Reporting Standard: (2 revisions)
- Sample Integrity Protection Standard: (2 revisions)
- Federal Laws in general (2 revisions)
- Sample Security Awareness Accessibility Standard: (2 revisions)
- Sarbanes-Oxley (2 revisions)
- The Copyright Act (2 revisions)
- Generalized Contract Law Outline (2 revisions)
- Spam (2 revisions)
- Sample Vulnerability Management Standard: (2 revisions)
- SOX.2.0.25: (2 revisions)
- International Issues (2 revisions)
- ME2.5: (2 revisions)
- Miscellaneous federal laws (2 revisions)
- IBM OS/400 Asset Protection Standards: (2 revisions)
- ISO/IEC 17799 (2 revisions)
- ISO/IEC 27002 (2 revisions)
- ME2.4: (2 revisions)
- Motion in limine (2 revisions)
- ME2.3: (2 revisions)
- Intent—knowledge (2 revisions)
- Industry Self-Regulation (2 revisions)
- Information Risk Guide (2 revisions)