Search results

Jump to navigation Jump to search
  • ==Change Management== ...for efficient handling of all Changes, in order to minimize the impact of Change-related incidents and to improve day-to-day operations. ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ==Service Desk Management== ...called for in IT Service Management (ITSM) as defined by the [[Information Technology Infrastructure Library]] (ITIL). It is intended to provide a Single Point o ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ...dling of all changes, and maintain the proper balance between the need for change and the potential detrimental impact of changes. ==Change management in development projects== ...
    4 KB (523 words) - 10:24, 23 April 2010
  • ==Configuration Management== ...rocess''' that tracks all of the individual Configuration Items (CI) in an information system which may be as simple as a single server, or as complex as the enti ...
    4 KB (570 words) - 16:12, 23 March 2007
  • ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as ...
    6 KB (885 words) - 10:12, 23 March 2007
  • [[Organizing Information Security:|'''Organizing Information Security''']]<br> [[Asset Management:|'''Asset Management''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • '''DS 5.7 Protection of Security Technology '''<br> Ensure that important security-related technology is made resistant to tampering and security documentation is not disclosed ...
    3 KB (377 words) - 18:52, 4 May 2006
  • ...ings are well known in hacker communities and easily determined via public information.<br> :'''PCI-2.1 Always change the vendor-supplied defaults before you install a system on the network (e. ...
    2 KB (283 words) - 17:00, 26 June 2006
  • ...Framework (MOF) 4.0''' is a series of guides aimed at helping information technology (IT) professionals establish and implement reliable, cost-effective service ...| governance]], [[Risk_management | risk]], and [[compliance]] activities; management reviews, and Microsoft Solutions Framework (MSF) best practices.<br> ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...e majority of their data processing, core processing, or other information technology systems or services are still expected to implement an appropriate BCP addr ...cial institutions are moving toward shorter recovery periods and designing technology recovery solutions into business processes. These technological advancement ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ==Security requirements of information systems== ...egory is to ensure that security is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • '''AI 6.1 Change Standards and Procedures'''<br> Set up formal change management procedures to handle in a standardized manner all requests (including maint ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ==Incident Management== ...| Service Level Management]] process area. The first goal of the incident management process is to restore a normal service operation as quickly as possible and ...
    9 KB (1,371 words) - 16:40, 23 May 2007
  • '''EVALUATION OF CONTROLS IN INFORMATION SYSTEMS (IS) QUESTIONNAIRE'''<br> ...estion. This can generally be achieved if the company involves an internal information systems auditor in the question answering process. Specific “Guidance Point ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ...anagement procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requ ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (819 words) - 13:54, 23 June 2006
  • =='''Sample Change Control Standard'''== ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • [[PO1.1:| 1.1 IT Value Management]]<br> [[PO1.6:| 1.6 IT Portfolio Management]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...sider include impact analysis, cost/benefit justification and requirements management.<br> ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    3 KB (425 words) - 13:19, 23 June 2006
  • ...bjective of this category is to ensure the correct and secure operation of information processing facilities.<br> ...formal organizational record, subject to appropriate change authorization, change tracking and archiving<br> ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...r abnormal activities that may need to be addressed. Access to the logging information is in line with business requirements in terms of access rights and retenti ...ngs, and disabling of SSID broadcasts. Enable Wi-Fi Protected Access (WPA) technology for [[Encryption | encryption]] and authentication when WPA-capable.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...virus control) across the organization to protect information systems and technology from malware (viruses, worms, spy-ware, spam, internally developed fraudule ...shed procedures across the organization to protect information systems and technology from computer viruses. ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ...mation technology (IT) systems and their performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiat ...bility framework to encourage desirable behavior in the use of information technology."''<br> ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ==Security Management== ...urity Management is based on the code of practice for information security management also known as ISO/IEC 17799. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ...ly dependent on IT and mediate between imperatives of the business and the technology, so agreed priorities can be established.<br> ...levels. While this will be an unpopular move, it is an important cultural change that can accelerate the process.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...his systems development life cycle (SDLC) describes the stages involved in information system development projects, from an initial feasibility study through main ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for the de ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • =='''Sample Life Cycle Management Standard'''== ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]]s that are intended to support businesses in achieving both qu ...s (hence the term ''Library''), each of which covers a core area within IT Management. The names ''ITIL'' and ''IT Infrastructure Library'' are Registered Trade ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...l institutions – such as credit reporting agencies – that receive customer information from other financial institutions. ...npublic information or not, there must be a policy in place to protect the information from foreseeable threats in security and data integrity ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • ==Information Security Audit== ...dit. However, information security encompasses much more than IT. Auditing information security covers topics from auditing the physical security of data centers ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...structure (major machinery or computing/network resource). As such, [[risk management]] must be incorporated as part of BCP. ...for implementing, operating and improving a documented business continuity management system (BCMS). ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...Tier II questions correspond to the Uniform Rating System for Information Technology (URSIT) rating areas and can be used to determine where the examiner may re ::* Audit information and summary packages submitted to the board or its audit committee ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...covered that with an organized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by t ...lping you understanding the core elements of a successful IT security risk management program for a commercial enterprise, the processes of calculating the cost ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...technology (IT), services, business processes generally, and human capital management. The CMM has been used extensively worldwide in government, commerce, indus ...capability maturity. Humphrey based this framework on the earlier Quality Management Maturity Grid developed by Philip B. Crosby in his book "Quality Is Free". ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...e disabled, changed, or otherwise properly configured to prevent access to information classified as Proprietary or Confidential.<br> ...MUST implement password constraints for all users that have the ability to change their passwords through the Oracle facilities, i.e., DBA's, SQL*Plus users. ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...[National Institute of Standards and Technology]] (NIST) as U.S. [[Federal Information Processing Standard|FIPS]] PUB 197 (FIPS 197) on November 26 2001 after a 5 ...d and fourth row is 1 byte, 3 byte and 4 byte respectively - although this change only applies for the Rijndael cipher when used with a 256-bit block, which ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ==Risk Management== ...ng some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disas ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...isions such as whether to deploy a standby database, a network replication technology, or a tape-based solution.</font><br> ...problems are found with the database, it might be necessary to add tables, change the database structure, and so forth. If the application is implemented sim ...
    20 KB (3,195 words) - 02:47, 23 February 2007
  • ...cording to whether the risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actua Certain aspects of many of the risk management standards have come under criticism for having no measurable improvement on ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...h of both mathematics and computer science, and is affiliated closely with information theory, [[computer security]], and engineering. Cryptography is used in man ...ed on an internal state which changes as the cipher operates. That state's change is controlled by the key, and, in some stream ciphers, by the plaintext str ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • ...nce in the United States coverage for workers and their families when they change or lose their jobs. Title II of HIPAA, known as the Administrative Simplifi ...system by creating standards for the use and dissemination of health care information.<br> ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...rvices intended to circumvent measures (commonly known as [[digital rights management]] or DRM) that control access to copyrighted works. It also criminalizes th ...t. However, section 1201(c) of the title clarified that the title does not change the underlying substantive copyright infringement rights, remedies, or defe ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ==Information Technology Auditor's Glossary== A service that gathers information from many websites, presents that information to the customer in a consolidated format, and, in some cases, may allow the ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...islation set new or enhanced standards for all U.S. public company boards, management and public accounting firms. It does not apply to privately held companies. ...sses. In many cases, Audit Committee members were not truly independent of management. ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • Authorized individuals may be employees, technology service provider (TSP) employees, vendors, contractors, customers, or visit ...lacement on the network is approved in accordance with institution policy. Change controls are typically used for devices inside the external perimeter, and ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...as a network design principle. The idea is that a maximally useful public information network aspires to treat all content, sites, and platforms equally." ...ts of net neutrality include consumer advocates, online companies and some technology companies. Many major Internet application companies are advocates of neutr ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...tion 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the adv (A) information contained in a financial record of a financial institution, or of a card is ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...d non-U.S. citizens, and changed FISA to make gaining foreign intelligence information the significant purpose of FISA-based surveillance, where previously it had The change in definition was meant to remove a legal "wall" between criminal investiga ...
    142 KB (21,198 words) - 10:23, 23 August 2011