Search results

Jump to navigation Jump to search
  • '''DS 5.7 Protection of Security Technology '''<br> Ensure that important security-related technology is made resistant to tampering and security documentation is not disclosed ...
    3 KB (377 words) - 18:52, 4 May 2006
  • ==Sample End User Computing and Technology Policy== ...tablishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipment. ...
    4 KB (507 words) - 14:58, 21 January 2014
  • ...g rules. Also, if fraud occurs and your organization has not completed the audit requirements, financial and legal responsibility will be placed more heavil [[Category:Information technology management|Governance]] ...
    2 KB (235 words) - 09:48, 23 October 2012
  • ==FFIEC Information Technology Examination Handbook Executive Summary== ...ve effort of the FFIEC’s five member agencies, has replaced the 1996 FFIEC Information Systems Examination Handbook (1996 Handbook). ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...ns that currently have a [[SAS 70]] service auditor’s examination (“SAS 70 audit”) performed, some changes will be required to effectively reporting under t ...res that all user organizations and their auditors have access to the same information and in many cases this will satisfy the user auditor's requirements.<br> ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...ine the nature of the impact— positive, negative or both—and maintain this information.<br> [[Image:account-audit-flow.jpg]]<br> ...
    3 KB (459 words) - 17:56, 21 June 2006
  • ...requirements are met by all components. The test data should be saved for audit trail purposes and for future testing.<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • ==IT Audit Roles and Responsibilities== ...e important element of an effective internal control system is an internal audit function that includes adequate IT coverage.<br> ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...most comprehensive, most beneficial, most accessible, and freely available information security guidance framework on the planet.<br> ...zation no matter what the size, shape, or form they come in. By protecting information, you protect identities, profits, reputations, and the list goes on and on. ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...nt]]s, on a more frequent basis. Technology plays a key role in continuous audit activities by helping to automate the identification of exceptions or anoma ...constantly for errors, fraud, and inefficiencies. It is the most detailed audit. ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • == Requirement 12: Maintain a policy that addresses information security. == ...ge:Key-control.jpg]][[PCI-12.3.2:|PCI-12.3.2 Authentication for use of the technology.]]<br> ...
    7 KB (988 words) - 19:11, 7 July 2006
  • '''EVALUATION OF CONTROLS IN INFORMATION SYSTEMS (IS) QUESTIONNAIRE'''<br> ...estion. This can generally be achieved if the company involves an internal information systems auditor in the question answering process. Specific “Guidance Point ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ...tablishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipment. Company information and telecommunications systems and equipment, including Internet, electroni ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ...r abnormal activities that may need to be addressed. Access to the logging information is in line with business requirements in terms of access rights and retenti ...ngs, and disabling of SSID broadcasts. Enable Wi-Fi Protected Access (WPA) technology for [[Encryption | encryption]] and authentication when WPA-capable.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...is a subset discipline of [[Corporate Governance]] focused on information technology (IT) systems and their performance management and [[risk management]]. The ...bility framework to encourage desirable behavior in the use of information technology."''<br> ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ==Information Security Audit== ...dit. However, information security encompasses much more than IT. Auditing information security covers topics from auditing the physical security of data centers ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...p" vulnerability management activities including vulnerability mitigation, information review and analysis, as well as metrics tracking and reporting.<br> ...on Company premises, or who have been granted access to and use of Company Information Assets, are covered by this standard and must comply with associated guidel ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • ==Audit Guidance Examination Procedures== ...ion related to IT controls. These procedures will disclose the adequacy of audit coverage and to what extent, if any, the examiner may rely upon the procedu ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...roviders have implemented adequate security controls to safeguard customer information. :* Ability to conduct audit coverage of security controls or obtain adequate reports of security testin ...
    6 KB (829 words) - 19:14, 17 April 2007
  • ...ay provide invalid information, which could result in unreliable financial information and reports.<br> ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...protection and management objectives, and define acceptable use of Company information assets.<br> ...iality, integrity, and availability of Company information assets. Company information assets are defined in the [[Sample Asset Identification and Classification ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • Links to helpful or interesting information security documents.<br> ...ed of lawyers, government policy and management professionals, information technology and security professionals, notaries from various legal systems, trade faci ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ==Security requirements of information systems== ...egory is to ensure that security is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • '''Incident Management''' otherwise known as '''Information Security Incident Management''', is a [[Service_Level_Management: | Service ...should be established to ensure a quick, effective and orderly response to information security incidents.<br> ...
    9 KB (1,371 words) - 16:40, 23 May 2007
  • ...ly dependent on IT and mediate between imperatives of the business and the technology, so agreed priorities can be established.<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...rganization. ITIL Security Management is based on the code of practice for information security management also known as ISO/IEC 17799. ...be safe against risks. When protecting information it is the value of the information that has to be protected. These values are stipulated by the confidentialit ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ...al log-in to access workplace computer, personnel from employer's internet technology (IT) department had complete administrative access to all employees' comput ...rocedures reserved right to audit and monitor Internet use and warned that information flowing through the university network was not confidential, users of unive ...
    5 KB (741 words) - 18:58, 22 February 2009
  • ===Start with a comprehensive audit of all software assets used in your enterprise.=== ...http://www.palamida.com Palamida] provide solutions that can automate this audit process and streamline ongoing compliance efforts.<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...ing information management costs through automated categoriza... | Cutting information management costs through automated categoriza...]] ...or your Next Regulatory Audit | Email and IM Prep for your Next Regulatory Audit]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...g theft of information from computers by eliminating the requirement that information must have been stolen through an interstate or foreign communication; #*Information contained in a financial record of a financial institution, or contained in ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...e disabled, changed, or otherwise properly configured to prevent access to information classified as Proprietary or Confidential.<br> ...[[Media:Oracle_Audit_UNIX_Script.txt]] provides an excellent comprehensive audit examination that has stood up to many professional Oracle compliance audits ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...erform work on Company premises or who have been granted access to Company information or systems, are covered by this standard and must comply with associated gu ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...pecific instructions and requirements for life cycle management of Company information systems, including hardware and software.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...l institutions – such as credit reporting agencies – that receive customer information from other financial institutions. ...npublic information or not, there must be a policy in place to protect the information from foreseeable threats in security and data integrity ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • ...isions such as whether to deploy a standby database, a network replication technology, or a tape-based solution.</font><br> ...banks through SNA, serial ports, and other types of networks. The required technology must be set up on the disaster recovery system, because there is no single ...
    20 KB (3,195 words) - 02:47, 23 February 2007
  • ...ns for those public companies not accurately representing data and company information. ...step in any risk assessment process. Senior management should incorporate information on IT issues such as resource limitations, threats, priorities, and key con ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • Personal data are defined as "any information relating to an identified or identifiable natural person ("data subject"); ...o be very broad. Data are "personal data" when someone is able to link the information to a person, even if the person holding the data cannot make this link. Som ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • In 1996, the National Institute of Standards and Technology (NIST) defined electronic data interchange as "the computer-to-computer int ...onstruction, etc. In some cases, EDI will be used to create a new business information flow (that was not a paper flow before). This is the case in the Advanced S ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ...nology Security Policies Demystified which is a combination of governance, technology and vigilance. If you are preparing to lead a company’s security function o ...tions however that does not provide a return on your investment; one being information security, both physical and digital unless IT security is your business.<br ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...h Insurance Portability and Accountability Act (HIPAA) Security Rule]. The audit framework is available for purchase to implement it in your own environment ...system by creating standards for the use and dissemination of health care information.<br> ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...ard, to provide independent oversight of public accounting firms providing audit services ("auditors"). It also creates a central oversight board tasked wi ...eporting requirements. It restricts auditing companies from providing non-audit services (e.g., consulting) for the same clients. ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ==Information Technology Auditor's Glossary== A service that gathers information from many websites, presents that information to the customer in a consolidated format, and, in some cases, may allow the ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...y can help shareholders exercise their rights by effectively communicating information that is understandable and accessible and encouraging shareholders to parti ...ly and balanced to ensure that all investors have access to clear, factual information.<br> ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • Authorized individuals may be employees, technology service provider (TSP) employees, vendors, contractors, customers, or visit ...mechanism includes numerous controls to safeguard and limits access to key information system assets at all layers in the network stack. This section addresses l ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...rch/en/] Forget the celebrity CEO. ''"Look beyond Six Sigma and the latest technology fad. One of the biggest strategic advantages a company can have, [BusinessW ...y can help shareholders exercise their rights by effectively communicating information that is understandable and accessible and encouraging shareholders to parti ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • This memo provides information for the Internet community. It does Handbook (SSH). It is intended to provide users with the information ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • ...d non-U.S. citizens, and changed FISA to make gaining foreign intelligence information the significant purpose of FISA-based surveillance, where previously it had and gave authorities the ability to share information gathered before a federal grand jury with other agencies.<ref name="Section ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...h Amendment generally prohibits law enforcement from accessing and viewing information stored in a computer if it would be prohibited from opening a closed contai ...all within an exception to the warrant requirement, before it accesses the information stored inside. ...
    154 KB (23,956 words) - 13:16, 5 August 2011