Search results

Jump to navigation Jump to search
View ( | next 100) (20 | 50 | 100 | 250 | 500)
  • :15. the right to audit responsibilities defined in the agreement, to have those audits carried out :4. review third party audit trails and records of security events, operational problems, failures, trac ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • * Collection and use of audit trails and similar evidence as part of the incident management and investig ...
    9 KB (1,371 words) - 16:40, 23 May 2007
  • Auditing must be activated to record relevant security events. The audit logs must be securely maintained for a reasonable period of time. Specific ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...additional services, e.g. retransmitting documents, providing third party audit information, acting as a gateway for different transmission methods, and ha ...of all the steps to move business documents between trading partners. The audit ensures that any transaction (which in reality is a business document) can ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • * After selecting appropriate auditing options, you should script the audit, wrap it in a stored procedure,and mark that stored procedure for AutoStart ...
    7 KB (1,018 words) - 13:53, 14 May 2007
  • :* IT audit findings provide insight into the veracity and responsiveness of the instit A successful risk-based IT audit program can be based on an effective scoring system. In establishing a scor ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...rial trends, monitor standards and [[Information_Security_Audit | security audit]] assessment methods and provide suitable liaison points when dealing with ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...diaWiki system to satisfy historical tracking, compliance requirements and audit requirements. ...
    8 KB (1,182 words) - 19:41, 15 January 2014
  • ...or your Next Regulatory Audit | Email and IM Prep for your Next Regulatory Audit]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...w and why of auditing firewalls, including a discussion of policy, design, audit, and tools.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...h Insurance Portability and Accountability Act (HIPAA) Security Rule]. The audit framework is available for purchase to implement it in your own environment ...and responding to security breaches that are identified either during the audit or the normal course of operations.<br> ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...ard, to provide independent oversight of public accounting firms providing audit services ("auditors"). It also creates a central oversight board tasked wi ...eporting requirements. It restricts auditing companies from providing non-audit services (e.g., consulting) for the same clients. ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...osing file paths. The combination of user names and file paths provides an audit trail of previous revisions that may not be desirable. The risk associated ...ts represents a potential privacy breach and can also create an unintended audit trail of authors. User names can be carried with comments, change tracking, ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...ce of funds; disguise the ultimate disposition of the funds; eliminate any audit trail and make it appear as though the funds came through legitimate source ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • * [[Audit_Guidance_Examination_Procedures | Information Technology Audit]] ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • ...stems; and cooperating with the Information Security Department and/or the Audit Department in operational assurance efforts.<br> ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • '''Audit charter''' A document approved by the board of directors that defines the IT audit function's responsibility, authority to review records, and accountability. ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...dards for security related functions (e.g., Authentication, Authorization, Audit). This section covers areas that must be considered as part of the overall ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • * [[Information technology audit]] ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • :* Recording in a secure audit log all significant events performed by the CA system, including the use of :* Periodically audit the access device configurations and patch levels. ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...hird party with access to the centralized database systems. Without proper audit and access controls in place, the threat potential increases. Another examp ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...rol procedures are policies implemented by an entity's board of directors, audit committee, management, and other personnel to provide reasonable assurance ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • virus checking and security audit tools for most computer ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • ...rol procedures are policies implemented by an entity's board of directors, audit committee, management, and other personnel to provide reasonable assurance ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...ncentration account]]s because such accounts do not provide an effective [[audit trail]] for transactions, and this may be used to facilitate money launderi The Secretary of State was ordered to audit and report back to Congress on the Visa waiver program specified under {{us ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...ee id. at 398. The policy stated that the CIA division would "periodically audit, inspect, and/or monitor [each] user's Internet access as deemed appropriat ...hat clerk did not remove public records from her office before a scheduled audit could occur; the resulting search was a "police intrusion" rather than an " ...
    154 KB (23,956 words) - 13:16, 5 August 2011
View ( | next 100) (20 | 50 | 100 | 250 | 500)