Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (278 words) - 18:21, 25 April 2007
  • =='''Asset Management'''== ...It is about the management, control and protection of '''all''' aspects of Information / Data in whatever form for example paper records or X-Ray Film and fiche. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • Encourage IT management to define and execute ` procedures to ensure that the IT continuity plan is '''Risk Association Control Activities:'''<br> ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ...report and classify problems that have been identified as part of incident management. The steps involved in problem classification are similar to the steps in c '''Risk Association Control Activities:'''<br> ...
    4 KB (601 words) - 15:01, 8 August 2006
  • '''PO 10.2 Project Management Framework'''<br> ...should be integrated with the enterprise portfolio management and program management processes.<br> ...
    3 KB (367 words) - 16:28, 21 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Production processes and associated controls operate as intended and suppo ...
    3 KB (420 words) - 14:06, 8 August 2006
  • '''DS 2.2 Supplier Relationship Management'''<br> Formalize the supplier relationship management process for each supplier. The relationship owners must liaise on customer ...
    3 KB (408 words) - 16:10, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: IT function does not meet the organizational needs.'''<br> ...
    3 KB (393 words) - 17:18, 1 May 2006
  • ...sks and responsibilities of internal and external service providers, their management and their customers, and the rules and structures to document, test and exe '''Risk Association Control Activities:'''<br> ...
    3 KB (456 words) - 17:15, 15 February 2007
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (270 words) - 14:54, 5 May 2006
  • '''PO 2.4 Integrity Management'''<br> '''Risk Association Control Activities:'''<br> ...
    4 KB (550 words) - 14:34, 1 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: IT function does not meet the organizational needs.'''<br> ...
    2 KB (338 words) - 19:03, 17 April 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: The transfer of programs into the live environment may not be appropriatel ...
    3 KB (377 words) - 14:55, 1 May 2006
  • ...nd services. The framework should integrate with the corporate performance management system.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (301 words) - 12:27, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...
    2 KB (351 words) - 13:57, 4 May 2006
  • ==AI 4.2 Knowledge Transfer to Business Management== ...rocesses. The knowledge transfer should include access approval, privilege management, segregation of duties, automated business controls, backup/recovery, physi ...
    3 KB (362 words) - 23:55, 14 June 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Job schedules can be easily ignored or circumvented, resulting in processi ...
    3 KB (467 words) - 18:39, 5 May 2006
  • ...chnology - Security techniques - Code of practice for information security management''. The current standard is a revision of the version published in [[2000]], ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...tory compliance and continuity requirements. This is related/linked to the information architecture.<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (446 words) - 16:36, 1 May 2006
  • ...and responsibilities for all personnel in the organization in relation to information systems to allow sufficient authority to exercise the role and responsibili '''Risk Association Control Activities:'''<br> ...
    3 KB (427 words) - 17:58, 1 May 2006
  • ==Risk Association Control Activities:== ::'''1. Risk: Operational failures may not be identified and resolved in an appropriate, ...
    2 KB (297 words) - 18:35, 25 April 2007
  • '''Risk Association Control Activities:'''<br> ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    4 KB (517 words) - 18:12, 21 June 2006
  • '''DS 1.1 Service Level Management Framework'''<br> ...ogue. The framework defines the organizational structure for service level management, covering the roles, tasks and responsibilities of internal and external se ...
    4 KB (524 words) - 15:03, 25 June 2006
  • ...ine the nature of the impact— positive, negative or both—and maintain this information.<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (459 words) - 17:56, 21 June 2006
  • '''DS 11.6 Security Requirements for Data Management '''<br> '''Risk Association Control Activities:'''<br> ...
    5 KB (649 words) - 18:23, 5 May 2006
  • =='''Information Security Presentation Samples'''== ...iness Security Evaluation - Comprehensive information security control and risk assessment guidance for the enterprise demystified. This presentation was o ...
    5 KB (653 words) - 12:45, 25 April 2007
  • '''PO 1.6 IT Portfolio Management'''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (470 words) - 13:39, 6 March 2007
  • ...requirements regarding delivery of value from IT investments, appetite for risk, integrity, ethical values, staff competence, accountability and responsibi '''Risk Association Control Activities:'''<br> ...
    4 KB (580 words) - 18:00, 23 June 2006
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (303 words) - 18:16, 25 April 2007
  • ...steering committee (or equivalent) composed of executive, business and IT management to: Determine prioritization of IT-enabled investment programs in line with '''Risk Association Control Activities:'''<br> ...
    4 KB (506 words) - 20:00, 25 June 2006
  • '''DS 10.4 Integration of Change, Configuration and Problem Management '''<br> ...ents, integrate the related processes of change, configuration and problem management. Monitor how much effort is applied to firefighting rather than enabling bu ...
    2 KB (248 words) - 17:50, 5 May 2006
  • ...us communication program, supported by top management in action and words. Management should give specific attention to communicating IT security awareness and t '''Risk Association Control Activities:'''<br> ...
    3 KB (442 words) - 18:58, 1 May 2006
  • ...ation of IT resources for operations, projects and maintenance to maximize Information Technologies contribution to optimizing the return on the enterprise’s port '''Risk Association Control Activities:'''<br> ...
    2 KB (346 words) - 18:25, 1 May 2006
  • '''PO 9.5 Risk Response'''<br> ...fits and select responses that constrain residual risks within the defined risk tolerance levels.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • '''PO 10.3 Project Management Approach'''<br> Establish a project management approach commensurate with the size, complexity and regulatory requirements ...
    4 KB (594 words) - 19:50, 25 June 2006
  • ...799]], "Information Technology - Code of practice for information security management." in 2000. [[ISO/IEC 17799]] was then revised in June 2005 and finally inc ...security management system]] (ISMS), referring to the information security management structure and controls identified in BS 7799-2, which later became [[ISO/IE ...
    2 KB (249 words) - 10:56, 27 October 2012
  • <br>Produce reports of service desk activity to enable management to measure service performance and service response times and to identify t '''Risk Association Control Activities:'''<br> ...
    2 KB (264 words) - 17:42, 5 May 2006
  • ...software, facilities, technology, and user procedures) and ensure that the information security requirements are met by all components. The test data should be sa '''Risk Association Control Activities:'''<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Controls provide reasonable assurance that policies and procedures that de ...
    3 KB (471 words) - 12:32, 23 June 2006
  • ...that are needed to create, implement, and maintain a risk management-based Information Security Program that complies with SOX Section 404.<br> ...cies, and standards) that are needed to create, implement, and maintain an Information Security Program that complies with SOX Section 404.<br> ...
    1 KB (204 words) - 13:03, 14 July 2006
  • '''Risk Association Control Activities:''' ::'''1. Risk: Controls provide reasonable assurance that policies and procedures that de ...
    4 KB (537 words) - 13:57, 23 June 2006
  • '''PO 10.9 Project Risk Management'''<br> ...at have the potential to cause unwanted change. Risks faced by the project management process and the project deliverable should be established and centrally rec ...
    3 KB (403 words) - 12:37, 23 June 2006
  • ...anagement procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requ '''Risk Association Control Activities:'''<br> ...
    6 KB (819 words) - 13:54, 23 June 2006
  • '''DS 12.5 Physical Facilities Management '''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (268 words) - 15:01, 8 May 2006
  • ...er include access rights and privilege management, protection of sensitive information at all stages, authentication and transaction integrity, and automatic reco '''Risk Association Control Activities:'''<br> ...
    3 KB (374 words) - 15:05, 3 May 2006
  • ...t Operations Framework (MOF) 4.0''' is a series of guides aimed at helping information technology (IT) professionals establish and implement reliable, cost-effect ...| governance]], [[Risk_management | risk]], and [[compliance]] activities; management reviews, and Microsoft Solutions Framework (MSF) best practices.<br> ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...ual responsible for the function and which exceptions should be escalated. Management is also responsible to inform affected parties.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (289 words) - 13:11, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Operational failures may not be identified and resolved in an appropriate, ...
    2 KB (324 words) - 14:50, 4 May 2006
  • ...nd prioritization of any reported issue as an incident, service request or information request. Measure end users’ satisfaction with the quality of the service de '''Risk Association Control Activities:'''<br> ...
    2 KB (340 words) - 17:40, 5 May 2006
  • ...ual responsible for the function and which exceptions should be escalated. Management is also responsible to inform affected parties.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (289 words) - 12:56, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Systems do not meet business needs because not all business functional and ...
    4 KB (510 words) - 13:54, 1 May 2006
  • ...ange processes. The IT process framework should be integrated in a quality management system and the internal control framework.<br> ...ay provide invalid information, which could result in unreliable financial information and reports.<br> ...
    5 KB (699 words) - 19:59, 25 June 2006
  • '''MANAGEMENT CONTROL '''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (354 words) - 20:12, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...
    2 KB (303 words) - 17:36, 5 May 2006
  • ==Information Security Policy== ...ective of this category is to provide management direction and support for information security in accordance with business requirements and all relevant laws, re ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...d so security incidents can be properly treated by the incident or problem management process. Characteristics include a description of what is considered a secu '''Risk Association Control Activities:'''<br> ...
    4 KB (548 words) - 14:21, 4 May 2006
  • ...ata classification policy and the enterprise’s media storage practices. IT management should ensure that offsite arrangements are periodically assessed, at least '''Risk Association Control Activities:'''<br> ...
    5 KB (700 words) - 18:07, 23 June 2006
  • '''DS 2.3 Supplier Risk Management'''<br> ...iness standards in accordance with legal and regulatory requirements. Risk management should further consider non-disclosure agreements (NDA), escrow contracts, ...
    7 KB (958 words) - 16:01, 25 June 2006
  • '''PO 5.1 Financial Management Framework'''<br> ...these portfolios to the budget prioritization, cost management and benefit management processes.<br> ...
    2 KB (353 words) - 18:22, 1 May 2006
  • '''PO 6.2 Enterprise IT Risk and Internal Control Framework'''<br> ...be aimed at maximizing success of value delivery while minimizing risks to information assets through preventive measures, timely identification of irregularities ...
    2 KB (331 words) - 18:47, 1 May 2006
  • '''PO 9.4 Risk Assessment'''<br> ...e methods. The likelihood and impact associated with inherent and residual risk should be determined individually, by category and on a portfolio basis.<br ...
    2 KB (304 words) - 20:21, 1 May 2006
  • ...ormation requirements, IT configuration, information risk action plans and information security culture into an overall IT security plan. The plan is implemented '''Risk Association Control Activities:''' ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.'''<br> ...
    2 KB (327 words) - 13:18, 4 May 2006
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (272 words) - 18:05, 25 April 2007
  • ::'''1. Risk: Insufficient control over authorization, authentication, nonrepudiation, d ...y policy exists and has been approved by an appropriate level of executive management. ...
    3 KB (351 words) - 16:49, 25 June 2006
  • ...d standards controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> ...d support for information security. This section provides templates for an Information Security Program Charter and supporting policies that are required to compl ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Terminated entities create unacceptable control risks to the Company.'''<b ...
    3 KB (366 words) - 16:39, 26 June 2006
  • ...rization controls over the initiation of transactions, resulting financial information may not be reliable. '''Risk Association Control Activities:'''<br> ...
    5 KB (721 words) - 11:49, 28 March 2008
  • '''PO 9.6 Maintenance and Monitoring of a Risk Action Plan'''<br> ...s). Monitor execution of the plans, and report on any deviations to senior management.<br> ...
    2 KB (325 words) - 01:16, 2 May 2006
  • '''AI 2.9 Applications Requirements Management'''<br> ...being approved through an established [[Change_control | change control]] management process.<br> ...
    2 KB (274 words) - 13:47, 6 March 2007
  • Ensure that IT management, working with the business, defines a balanced set of performance objective * Risk and compliance with regulations.<br> ...
    3 KB (362 words) - 12:33, 4 May 2006
  • ==Information Security Aspects of Business Continuity Management== ..., interruptions to business activities and processes caused by failures of information systems. ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as ...
    6 KB (885 words) - 10:12, 23 March 2007
  • '''PO 8.1 Quality Management System'''<br> ...conformity. The QMS should define the organizational structure for quality management, covering the roles, tasks and responsibilities. All key areas develop thei ...
    2 KB (337 words) - 19:47, 1 May 2006
  • ...n repository and be properly integrated with change management and problem management procedures. '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...
    3 KB (429 words) - 18:55, 25 June 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (281 words) - 17:42, 5 May 2006
  • ...support of the business to initiate, record, process and report financial information. Deficiencies in this area could significantly impact an entity’s financial '''Risk Association Control Activities:''' ...
    4 KB (522 words) - 20:12, 25 June 2006
  • ...y to explain deviations and performance problems. Upon review, appropriate management action should be initiated and controlled.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (347 words) - 13:38, 4 May 2006
  • ...ves, or from programs, projects or service improvement initiatives. Change Management can ensure standardized methods, processes and procedures are used for all ==Change management in development projects== ...
    4 KB (523 words) - 10:24, 23 April 2010
  • * Review, negotiation and establishment of management responses.<br> * Assignment of responsibility for remediation (can include risk acceptance).<br> ...
    2 KB (286 words) - 13:05, 4 May 2006
  • ...t considers changes in the competitive environment, economies of scale for information systems staffing and investments, and improved interoperability of platform '''Risk Association Control Activities:'''<br> ...
    2 KB (351 words) - 17:03, 21 June 2006
  • '''PO 5.4 Cost Management'''<br> Implement a cost management process comparing actual costs to budgets. Costs should be monitored and re ...
    2 KB (303 words) - 18:29, 1 May 2006
  • '''DS 5.4 User Account Management'''<br> ...rmation are contractually arranged for all types of users. Perform regular management review of all accounts and related privileges.<br> ...
    6 KB (846 words) - 13:52, 4 May 2006
  • ...ools for operating, accessing and using the systems and services. Relevant information to consider is naming, version numbers and licensing details. A baseline of '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...
    4 KB (506 words) - 18:44, 25 June 2006
  • ...nge standards that require a post-implementation review of the operational information system to assess and report on whether the change met customer requirements '''Risk Association Control Activities:'''<br> ...
    3 KB (394 words) - 11:59, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: In-House and or Package applications may not meet all business and applica ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ==Security requirements of information systems== ...egory is to ensure that security is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...capacity forecasting of IT resources at regular intervals to minimize the risk of service disruptions due to insufficient capacity or performance degradat '''Risk Association Control Activities:'''<br> ...
    3 KB (490 words) - 13:42, 4 May 2006
  • ...deviations from expected performance should be identified, and appropriate management action should be initiated and reported.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (332 words) - 12:39, 4 May 2006
  • '''PO 10.1 Program Management Framework'''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (345 words) - 01:18, 2 May 2006
  • ...izing tasks, error tolerance mechanisms and resource allocation practices. Management should ensure that contingency plans properly address availability, capacit '''Risk Association Control Activities:'''<br> ...
    2 KB (284 words) - 14:37, 21 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...
    3 KB (460 words) - 16:08, 21 June 2006
  • '''DS 5.8 Cryptographic Key Management '''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (413 words) - 19:02, 4 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (333 words) - 16:42, 5 May 2006
  • ==PO 1.1 IT Value Management== ...including financial worth, the risk of not delivering a capability and the risk of not realizing the expected benefits.<br> ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ...urable and predictable by users to encourage proper use of resources. User management should be able to verify actual usage and charging of services. '''Risk Association Control Activities:'''<br> ...
    2 KB (305 words) - 14:51, 5 May 2006
  • ...es and procedures (e.g., hiring, positive work environment and orienting). Management implements processes to ensure that the organization has an appropriately d '''Risk Association Control Activities:'''<br> ...
    2 KB (312 words) - 18:19, 3 May 2006
  • ...to create, implement, and maintain a best practice, risk management-based information security program.<br> ...to create, implement, and maintain a best practice, risk management-based Information Security Program.<br> ...
    5 KB (705 words) - 11:39, 30 May 2015
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'' ...
    2 KB (321 words) - 15:35, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or inadequately tested. Systems produce ...
    4 KB (530 words) - 11:58, 23 June 2006
View ( | ) (20 | 50 | 100 | 250 | 500)