Search results

Jump to navigation Jump to search
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)
  • ...from those budgeted and amount of specialization of the software planned. Risks that affect revenues can be unanticipated competition, privacy, intellectua ...arch and development expenditures can lead both business and technological risks since specialization does not lead to lower unit costs of software (Rao & K ...
    1 KB (215 words) - 18:32, 13 April 2007
  • ...selves to insurance carriers. Coverage is increasingly available to cover risks from security breaches or denial of service attacks. Several insurance com :* Availability, cost, and covered risks vary by insurance company. ...
    3 KB (469 words) - 13:30, 10 April 2007
  • ...ior management on the appetite for IT risk and approval of any residual IT risks.<br> ...
    3 KB (370 words) - 18:04, 1 May 2006
  • ...ling the areas or events that have the potential to cause unwanted change. Risks faced by the project management process and the project deliverable should ....17:|'''SOX.1.17''']] Controls provide reasonable reassurance that project risks are managed.<br> ...
    3 KB (403 words) - 12:37, 23 June 2006
  • ...technology involves more than containing costs and controlling operational risks. An institution capable of aligning its IT infrastructure to support its bu ...information. Changes in technology may not only introduce new operational risks to manage, but can also introduce an institution to increased risk to its r ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ...t should be aimed at maximizing success of value delivery while minimizing risks to information assets through preventive measures, timely identification of ...
    2 KB (331 words) - 18:47, 1 May 2006
  • ...arranged, responsibilities reassigned and access rights removed such that risks are minimized and continuity of the function is guaranteed.<br> ::'''1. Risk: Terminated entities create unacceptable control risks to the Company.'''<br> ...
    3 KB (366 words) - 16:39, 26 June 2006
  • ...as part of the organization’s process for the development of requirements. Risks include threats to data integrity, security, availability, [[Privacy | priv ...
    2 KB (269 words) - 23:52, 14 June 2007
  • This section provides a series of presentations that cover emerging security risks and topics of interest. Your organization can use and tailor these presenta ...resentation on executive management awareness covers security and business risks, anatomy of an attack, and a security risk discussion exercise.<br> ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...agement should identify, measure, control, and monitor technology to avoid risks that threaten the safety and soundness of an institution.<br> The risk identification and management process for technology-related risks is not complete without consideration of the overall IT environment in whic ...
    4 KB (528 words) - 16:58, 28 March 2010
  • ...nes the risks the client faces in going to trial, and compares them to the risks if a guilty plea or a plea of no contest is entered. Counsel may even prese ...
    3 KB (603 words) - 17:57, 22 February 2009
  • ...entation risks and addressed all the necessary components to address these risks, e.g., if the completeness and accuracy of system interfaces were essential ...
    3 KB (475 words) - 13:09, 23 June 2006
  • ...[[SOX.2.0.14:|'''SOX.2.0.14''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in t ...
    2 KB (294 words) - 18:21, 14 June 2006
  • :::a. [[SOX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in t ...
    2 KB (291 words) - 16:02, 25 June 2006
  • ...ment process, and may also be the most difficult and prone to error. Once risks have been identified and assessed, the steps to properly deal with them are .../benefit analysis; individual risks are of more use for evaluating whether risks to individuals are "acceptable". ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'''<br> ...
    2 KB (295 words) - 15:40, 25 June 2006
  • ...or FTP as alternatives, resulting in higher costs and/or greater security risks. ...
    961 bytes (140 words) - 22:16, 15 March 2010
  • ===Identification of risks related to external parties=== Risks to the organization's information and information processing facilities fro ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ===Risks of Metadata=== ...
    4 KB (587 words) - 22:52, 15 March 2010
  • ...that empowers the Program to manage Information Security-related business risks.<br> ...
    2 KB (202 words) - 12:40, 15 June 2007
  • ...luences operational risks (also referred to as transactional risks). These risks include the possibility of loss resulting from inadequate processes, person ...ls and discusses various development, acquisition, and maintenance project risks. Action summaries highlight the primary considerations within each section. ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • :* SP-3; Joint Interagency Issuance on End-User Computing Risks, January 1988 :* SP-8; Interagency Document on EDP Risks in Mergers & Acquisitions, September 1991 ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...vernment-wide management and oversight of the related information security risks, including coordination of information security efforts throughout the civi ...
    1 KB (192 words) - 10:33, 1 June 2010
  • ...vernment-wide management and oversight of the related information security risks, including coordination of information security efforts throughout the civi ...
    1 KB (192 words) - 10:36, 1 June 2010
  • ...nsider the costs and benefits and select responses that constrain residual risks within the defined risk tolerance levels.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • Assess on a recurrent basis the likelihood and impact of all identified risks, using qualitative and quantitative methods. The likelihood and impact asso ...
    2 KB (304 words) - 20:21, 1 May 2006
  • ...ported, enforced management policy maximizes the rewards and minimizes the risks of the open-source software model.<br> ...open source or not) will yield unacceptable levels of technical and legal risks for enterprises. Incorporate the following aspects in your open-source poli ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'''<br> ...
    2 KB (321 words) - 15:35, 25 June 2006
  • * Report security events, potential events, or other risks to the organization and its assets<br> ...n(s)/sensitivity(ies) of the information to be accessed, and the perceived risks<br> ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • ..., ensuring that the business and IT regularly assess and report IT-related risks and the impact on the business. Make sure IT management follows up on risk ...
    2 KB (334 words) - 13:36, 4 May 2006
  • ...tion. Seek approval for recommended actions and acceptance of any residual risks, and ensure that committed actions are owned by the affected process owner( ...
    2 KB (325 words) - 01:16, 2 May 2006
  • ==E-Banking Risks== Transaction or Operations risks arises from fraud, processing errors, system disruptions, or other unantici ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...ects technology standards and practices based on their business relevance, risks and compliance with external requirements.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...risk assessment, the goal of the assessment and the criteria against which risks are evaluated.<br> ...
    2 KB (317 words) - 20:10, 1 May 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...ves have been achieved, deliverables obtained, performance targets met and risks mitigated. Upon review, any deviations from expected performance should be ...
    2 KB (332 words) - 12:39, 4 May 2006
  • ...ves have been achieved, deliverables obtained, performance targets met and risks mitigated. Integrate reporting with similar output from other business func ...
    2 KB (347 words) - 13:38, 4 May 2006
  • ::Do not use scare tactics; give an even-handed presentation of risks. ...
    2 KB (315 words) - 18:46, 25 September 2006
  • ...ountants created two trust services, WebTrust and SysTrust, to address the risks and opportunities of information technology. WebTrust reports provide assur ...e effectiveness of the security process in continually mitigating changing risks. Additionally, the SAS 70 report may not address whether the TSP is meeting ...
    6 KB (829 words) - 19:14, 17 April 2007
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...opment, test, and operational facilities should be separated to reduce the risks of unauthorized access or changes to the operational system.<br> ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ...plication security and availability requirements in response to identified risks, in line with data classification, the organization’s information security ...
    3 KB (374 words) - 15:05, 3 May 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (394 words) - 17:12, 22 March 2007
  • ...mplemented to enable the use of protection profiles and otherwise mitigate risks to data. If protection profiles are not used, the policies should accompl ...ts. Additionally, the devices may be lost or stolen. Mitigation of those risks typically involves encryption of sensitive data, host-provided access contr ...
    9 KB (1,246 words) - 18:20, 10 April 2007
  • ::'''(C)''' implementing policies and procedures to cost-effectively reduce risks to an acceptable level; and<br> ::'''(B)''' cost-effectively reduce information security risks to an acceptable level;<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...curity staff should receive ongoing security training that covers emerging risks to sensitive Company information assets and the latest security trends. ...
    2 KB (275 words) - 17:10, 23 January 2014
  • DIACAP also uses weighted metrics to describe risks and their mitigation. ...
    2 KB (229 words) - 10:14, 15 April 2012
  • Identify and mitigate risks relating to suppliers’ ability to continue effective service delivery in a :::a. [[SOX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in t ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ::'''(C)''' implementing policies and procedures to cost-effectively reduce risks to an acceptable level; and<br> ::'''(B)''' cost-effectively reduce information security risks to an acceptable level;<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • ...ute to the enterprise’s strategic objectives (goals) and related costs and risks. It includes how IT will support IT-enabled investment programs and operati ...
    3 KB (424 words) - 17:01, 21 June 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (442 words) - 13:59, 23 June 2006
  • ...formation Security Program to manage Information Security-related business risks.<br> ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...re based on risk assessments, cost-effectively reduce information security risks to an acceptable level, and ensure that information security is addressed t ...lying with organizational policies and procedures designed to reduce these risks ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • :* What single points of failure exist and how significant are those risks? ...
    3 KB (453 words) - 18:45, 25 April 2007
  • ::'''2. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (471 words) - 12:32, 23 June 2006
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    3 KB (460 words) - 16:08, 21 June 2006
  • ...ion assurance (IA)''' is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or ...fully considered. Thus, the IA practitioner does not seek to eliminate all risks, were that possible, but to manage them in the most [[cost-effective]] way. ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...der future flexibility for capacity additions, transition costs, technical risks and the lifetime of the investment for technology upgrades. Assess the comp ...
    4 KB (496 words) - 17:26, 21 June 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (497 words) - 14:57, 23 June 2006
  • ::'''2. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    4 KB (517 words) - 18:12, 21 June 2006
  • '''1. ISO 17799 6.2.1: The risks to the organization’s information and information processing facilities fro ...to identify any requirements for specific controls. The identification of risks related to external party access should take into account the following iss ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ...that empowers the Program to manage Information Security-related business risks.<br> ...
    4 KB (535 words) - 16:51, 25 July 2006
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.''' ...
    4 KB (524 words) - 15:03, 25 June 2006
  • ...that empowers the Program to manage Information Security-related business risks.<br> ...
    5 KB (614 words) - 16:46, 25 July 2006
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...act of unfortunate events or to maximize the realization of opportunities. Risks can come from uncertainty in financial markets, project failures, legal lia ...rder. In practice the process can be very difficult, and balancing between risks with a high probability of occurrence but lower loss versus a risk with hig ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...education and training to ensure continued awareness, and address emerging risks or topics of interest. Specific instructions and requirements for providing ...
    3 KB (418 words) - 19:53, 14 January 2014
  • ...destruction to physical components. Conceptually, those physical security risks are mitigated through zone-oriented implementations. Zones are physical are ...te preventative and detective controls in each zone to protect against the risks of:<br> ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...based on a culture that supports value delivery while managing significant risks, encourages cross-divisional co-operation and teamwork, promotes compliance ...
    4 KB (580 words) - 18:00, 23 June 2006
  • ...art of the security process. Risk assessments should consider the changing risks that appear in business continuity scenarios and the different security pos ...and consideration of preventive and mitigating controls in light of these risks<br> ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ...paths of a social or political environment and possibly diplomatic and war risks. For example, in the recent Iraq War, the Pentagon certainly had to model a ...
    4 KB (607 words) - 18:29, 16 February 2007
  • ...an effective audit function that may be relied upon to identify and manage risks. ...sight have appropriate level of experience and knowledge of IT and related risks ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...is to be protected against risks. Security is the means to be safe against risks. When protecting information it is the value of the information that has to ...s in the IT-infrastructure and changes in the organization itself security risks are bound to change over time. The maintenance of the security concerns bot ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ::'''3. Risk: Third party processors create unacceptable control risks to the Company. ''' ...
    5 KB (674 words) - 18:14, 21 June 2006
  • ...key control objectives relating to the mitigation of information security risks, are satisfied. This helps keep the standard relevant despite the evolving ...and sizes of organization according to the particular information security risks they face. In practice, this flexibility gives users a lot of latitude to a ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...is the first place to start when conducting gap analysis and deciding what Risks are relevant to the assets. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...cost of a risk exposure and what the appropriate costs of mitigating those risks should be.<br> ...uently, the business mission, from information technology related security risks. Each organization is unique and the thresholds for how much risk it is wil ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...ic review against business needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requirements.<br> ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...s document, provided by CERT, gives home users an overview of the security risks and countermeasures associated with Internet connectivity, especially in th ...concepts needed to read through the hype in the marketplace and understand risks and how to deal with them.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...formation Security Program to manage Information Security-related business risks.<br> ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ...ch as support issues and upgrades, periodic review against business needs, risks and security requirements.<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ::ISO 17799 defines Personnel Security objectives to reduce risks of human error, theft, fraud, or misuse of facilities; ensure that users ar ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...and control issues associated with the institution’s operations, including risks in new products, emerging technologies, information systems, and electronic '''Control issues and risks associated with reliance on technology can include:''' ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...need to put aside to guard against the types of financial and operational risks banks (and the whole economy) face. One focus was to maintain sufficient c ...k that a bank faces: credit risk, operational risk, and market risk. Other risks are not considered fully quantifiable at this stage. ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    6 KB (804 words) - 12:14, 23 June 2006
  • ...the longest time the business can allow for without incurring significant risks or significant loss, allowing system designers to specify designs that are ...refully shares (or "syndicates") hardware between them, according to these risks. ...
    13 KB (2,264 words) - 11:10, 27 October 2012
  • ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'''<br> ...
    6 KB (846 words) - 13:52, 4 May 2006
  • ::'''2. Risk: Third party processors create unacceptable control risks to the Company. ''' ...
    6 KB (870 words) - 18:08, 21 June 2006
  • ...f the budget process a process for analyzing, tracking, and evaluating the risks and results of all major capital investments in information systems by exec ...h agency a process for maximizing the value and assessing and managing the risks of information technology acquisitions. Directs such agency heads to utiliz ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...[SOX.2.0.14:| '''SOX.2.0.14''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in t ...ed by linking to audio and video files exposes an organization to multiple risks. The first risk is that sensitive information may be contained in the direc ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...ment and treatment]] - analysis of the organization's information security risks ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...ts on the one hand and, on the other, the value of the information and the risks in the processing environment. Security forms an important added value for ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ...that empowers the Program to manage Information Security-related business risks.<br> ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disasters or fires, ac ...ater. In practice the process can be very difficult, and balancing between risks with a high probability of occurrence but lower loss vs. a risk with high l ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • [[PO9:| '''9 Assess and Manage IT Risks''']]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ::'''3. Risk: Third party processors create unacceptable control risks to the Company.''' ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ISO 17799 defines Personnel Security objectives to reduce risks of human error, theft, fraud, or misuse of facilities; ensure that users ar ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • :b) establishing a formal policy to protect against risks associated with obtaining files and software either from or via external ne ...
    8 KB (1,177 words) - 19:00, 25 June 2006
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)