Search results

Jump to navigation Jump to search
View ( | next 100) (20 | 50 | 100 | 250 | 500)
  • ...r abnormal activities that may need to be addressed. Access to the logging information is in line with business requirements in terms of access rights and retenti '''Risk Association Control Activities:'''<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...jectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...y Assessment and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']], and provides specific instructions and requirements for assess ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • ...protection and management objectives, and define acceptable use of Company information assets.<br> ...iality, integrity, and availability of Company information assets. Company information assets are defined in the [[Sample Asset Identification and Classification ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...odies, such as an IT strategy committee, to provide strategic direction to management relative to IT, ensuring that the strategy and objectives are cascaded down '''Risk Association Control Activities:'''<br> ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...ents and files include hidden data, firm-wide understanding about metadata management as a real security concern still lags. At best, unintentional disclosure of confidential information can be awkward; at worst, it can raise the specter of malpractice. Potentia ...
    4 KB (587 words) - 22:52, 15 March 2010
  • ...stems or system functionality does not delivered as required and financial information is not processed as intended. ''' 2. Discuss with members of the organization responsible for service level management and test evidence to determine whether service levels are actively managed. ...
    3 KB (342 words) - 15:05, 25 June 2006
  • ...tandard in the field of [[Business continuity planning|Business Continuity Management]] (BCM). This standard replaces PAS 56, a publicly available specification, BS 25999 is a Business Continuity Management (BCM) standard published by the British Standards Institution (BSI). ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...protection and management objectives, and define acceptable use of Company information assets.<br> ...c standards on the identification, classification, and labeling of Company information assets.<br> ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...jectives for establishing specific standards on the assessment and ongoing management of wireless technologies utilized for the extension of network infrastructu ...on Company premises, or who have been granted access to and use of Company Information Assets, are covered by this standard and must comply with associated guidel ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ::'''9. Risk: Insufficient control over authorization, authentication, nonrepudiation, d 2. Inquire whether management has performed an independent assessment of controls within the past year (e ...
    3 KB (360 words) - 17:03, 9 April 2007
  • ...nization’s ability to identify, acquire, install, and maintain appropriate information technology systems.” The process includes the internal development of soft ...o deliver products or services, maintain a competitive position, or manage information.<br> ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • ...particularly authentication credentials and the transmission of sensitive information. It can be used throughout a technological environment, including the oper ...f making data unavailable should anything go wrong with data handling, key management, or the actual encryption. For example, a loss of encryption keys or other ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • ...o or from the system audit process. This section provides templates for an Information Security Program Charter and supporting policies that are required to compl :This section provides templates for an Information Security Program Charter and supporting policies that are required to compl ...
    6 KB (774 words) - 12:41, 25 May 2007
  • '''Risk Association Control Activities:''' ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • '''(a)''' In General.— The Director shall oversee agency information security policies and practices, including—<br> ...g the implementation of policies, principles, standards, and guidelines on information security, including through ensuring timely agency adoption of and complian ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ==Information Technology Management Reform Act of 1996== ...nt Reform Act of 1996 - Title LI (sic): Responsibility for Acquisitions of Information Technology.'''<br> ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • Among the areas top management analyzes are:<br> ...tioned customer KPIs are developed and improved with customer relationship management.<br> ...
    5 KB (786 words) - 16:48, 22 March 2007
  • =='''Sample Life Cycle Management Standard'''== ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...bjective of this category is to ensure the correct and secure operation of information processing facilities.<br> ==Communications and Operations Management== ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...mation technology (IT) systems and their performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiat ...and accountability framework to encourage desirable behavior in the use of information technology."''<br> ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...d sites supporting the Company, or who have been granted access to Company information or systems, are covered by this policy and must comply with associated stan ...through systems owned or administered by or on the behalf of the Company. Information Assets include all personal, private, or financial data about employees, cl ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • ...4:|'''Requirement 4: Encrypt transmission of cardholder data and sensitive information across public networks.''']] '''Maintain a Vulnerability Management Program''' ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • #[[Getting it Right in Records Management | Getting it Right in Records Management]] ...rds management survey - call for sustainable ... | 2009 electronic records management survey - call for sustainable ...]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...res that all user organizations and their auditors have access to the same information and in many cases this will satisfy the user auditor's requirements.<br> ...ol oriented professionals who have experience in accounting, auditing, and information security. A SSAE 16 engagement allows a service organization to have its co ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...ed into development and production processes and procedures to ensure that information assets are consistently available to conduct business and support business ## System and network failures should be reported immediately to the Information Technology Director or designated IT operations manager. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for the de ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...most comprehensive, most beneficial, most accessible, and freely available information security guidance framework on the planet.<br> ...zation no matter what the size, shape, or form they come in. By protecting information, you protect identities, profits, reputations, and the list goes on and on. ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source sof ...ed return on investment, but also significant risk of noncompliance (legal risk).<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...anized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by the exercise of vul ...am for a commercial enterprise, the processes of calculating the cost of a risk exposure and what the appropriate costs of mitigating those risks should be ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for follow ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...c standards on the assessment and ongoing monitoring of threats to Company information assets.<br> ...on Company premises, or who have been granted access to and use of Company Information Assets, are covered by this standard and must comply with associated guidel ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • ...risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actuarial assessments ...of the risk, and accepting some or all of the consequences of a particular risk. ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • Links to helpful or interesting information security documents.<br> ...e is comprised of lawyers, government policy and management professionals, information technology and security professionals, notaries from various legal systems, ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...it function. Tier II questions correspond to the Uniform Rating System for Information Technology (URSIT) rating areas and can be used to determine where the exam :1. Review past reports for outstanding issues, previous problems, or high-risk areas with insufficient coverage related to IT. Consider: ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...structure (major machinery or computing/network resource). As such, [[risk management]] must be incorporated as part of BCP. ...for implementing, operating and improving a documented business continuity management system (BCMS). ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • The board of directors and senior management are responsible for ensuring that the institution’s system of internal cont ...hould assign responsibility for the internal audit function to a member of management (hereafter referred to as the “internal audit manager”) who has sufficient ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...jectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...Guidelines''' builds on the objectives established in the '''Vulnerability Management Standard''', and provides specific instructions and requirements for assess ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • ...m [[Information_Security_Audit | audit]] activities, such as control and [[risk assessment]]s, on a more frequent basis. Technology plays a key role in con ...mation can be evaluated at any given point of time, it also means that the information is able to be verified constantly for errors, fraud, and inefficiencies. It ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...l institutions – such as credit reporting agencies – that receive customer information from other financial institutions. ...npublic information or not, there must be a policy in place to protect the information from foreseeable threats in security and data integrity ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or third parties have inappropriate acce ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...nvestment practices. Generally speaking, these rules mean that the greater risk to which the bank is exposed, the greater the amount of capital the bank ne # Ensuring that Capital requirement is more risk sensitive; ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ==Risk Management== ...ng some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disas ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ==Information Security Audit== ...dit. However, information security encompasses much more than IT. Auditing information security covers topics from auditing the physical security of data centers ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...technology (IT), services, business processes generally, and human capital management. The CMM has been used extensively worldwide in government, commerce, indus ...capability maturity. Humphrey based this framework on the earlier Quality Management Maturity Grid developed by Philip B. Crosby in his book "Quality Is Free". ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]]s that are intended to support businesses in achieving both qu ...s (hence the term ''Library''), each of which covers a core area within IT Management. The names ''ITIL'' and ''IT Infrastructure Library'' are Registered Trade ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...individual keys for [[Encryption | encryption]] may raise significant key management issues. ...line business running. Unauthorized modification of even a single piece of information within a database can lead to reputation damage, litigation, or the collaps ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ’Personal Data’ means any information concerning an identified or identifiable individual. Unless otherwise noted ...such as racial or ethnic origin, present or future health status, genetic information, religious, philosophical or moral beliefs, union affiliation, political vi ...
    18 KB (2,869 words) - 17:46, 29 August 2014
  • * Authentication and password management * Intrusion detection and security risk assessment ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...[National Institute of Standards and Technology]] (NIST) as U.S. [[Federal Information Processing Standard|FIPS]] PUB 197 (FIPS 197) on November 26 2001 after a 5 ...ne 2003, the US Government announced that AES may be used for [[classified information]]: ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...system by creating standards for the use and dissemination of health care information.<br> ...health care clearinghouses, such as billing services and community health information systems, and health care providers that transmit health care data in a way ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...e disabled, changed, or otherwise properly configured to prevent access to information classified as Proprietary or Confidential.<br> Security administrators SHOULD consider issues related to privilege management for all types of users. For example, in a database with many usernames, it ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...mechanism includes numerous controls to safeguard and limits access to key information system assets at all layers in the network stack. This section addresses l ...um required for work to be performed exposes the institution’s systems and information to a loss of confidentiality, integrity, and availability. Accordingly, th ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...islation set new or enhanced standards for all U.S. public company boards, management and public accounting firms. It does not apply to privately held companies. ...relationship, conceivably placing a significant consulting arrangement at risk, damaging the auditing firm's bottom line. ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ==Information Technology Auditor's Glossary== A service that gathers information from many websites, presents that information to the customer in a consolidated format, and, in some cases, may allow the ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...enable it to perform a specific task, such as the storage and retrieval of information. The program is produced by one or more human authors, but in its final “mo ...ogy in particular makes it easy to transmit and make perfect copies of any information existing in digital form, including copyright-protected works. The second f ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...tion 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the adv (A) information contained in a financial record of a financial institution, or of a card is ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...as a network design principle. The idea is that a maximally useful public information network aspires to treat all content, sites, and platforms equally." ...he ''Wall Street Journal'' said that YouTube, MySpace and blogs are put at risk by net neutrality. Swanson says that YouTube streams as much data in three ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...h Amendment generally prohibits law enforcement from accessing and viewing information stored in a computer if it would be prohibited from opening a closed contai ...all within an exception to the warrant requirement, before it accesses the information stored inside. ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...nd flash drives, and the times the computer was in use. Collectively, this information can reveal to an investigator not just what a computer happens to contain a ...provide (if known) the user's name, street address, and other identifying information. In some cases, investigators confirm that the person named by the ISP actu ...
    138 KB (21,660 words) - 13:18, 5 August 2011
View ( | next 100) (20 | 50 | 100 | 250 | 500)