Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...t considers changes in the competitive environment, economies of scale for information systems staffing and investments, and improved interoperability of platform '''Risk Association Control Activities:'''<br> ...
    2 KB (351 words) - 17:03, 21 June 2006
  • '''PO 5.4 Cost Management'''<br> Implement a cost management process comparing actual costs to budgets. Costs should be monitored and re ...
    2 KB (303 words) - 18:29, 1 May 2006
  • '''DS 5.4 User Account Management'''<br> ...rmation are contractually arranged for all types of users. Perform regular management review of all accounts and related privileges.<br> ...
    6 KB (846 words) - 13:52, 4 May 2006
  • ...ools for operating, accessing and using the systems and services. Relevant information to consider is naming, version numbers and licensing details. A baseline of '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...
    4 KB (506 words) - 18:44, 25 June 2006
  • ...nge standards that require a post-implementation review of the operational information system to assess and report on whether the change met customer requirements '''Risk Association Control Activities:'''<br> ...
    3 KB (394 words) - 11:59, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: In-House and or Package applications may not meet all business and applica ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ==Security requirements of information systems== ...egory is to ensure that security is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...capacity forecasting of IT resources at regular intervals to minimize the risk of service disruptions due to insufficient capacity or performance degradat '''Risk Association Control Activities:'''<br> ...
    3 KB (490 words) - 13:42, 4 May 2006
  • ...deviations from expected performance should be identified, and appropriate management action should be initiated and reported.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (332 words) - 12:39, 4 May 2006
  • '''PO 10.1 Program Management Framework'''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (345 words) - 01:18, 2 May 2006
  • ...izing tasks, error tolerance mechanisms and resource allocation practices. Management should ensure that contingency plans properly address availability, capacit '''Risk Association Control Activities:'''<br> ...
    2 KB (284 words) - 14:37, 21 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...
    3 KB (460 words) - 16:08, 21 June 2006
  • '''DS 5.8 Cryptographic Key Management '''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (413 words) - 19:02, 4 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (333 words) - 16:42, 5 May 2006
  • ==PO 1.1 IT Value Management== ...including financial worth, the risk of not delivering a capability and the risk of not realizing the expected benefits.<br> ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ...urable and predictable by users to encourage proper use of resources. User management should be able to verify actual usage and charging of services. '''Risk Association Control Activities:'''<br> ...
    2 KB (305 words) - 14:51, 5 May 2006
  • ...es and procedures (e.g., hiring, positive work environment and orienting). Management implements processes to ensure that the organization has an appropriately d '''Risk Association Control Activities:'''<br> ...
    2 KB (312 words) - 18:19, 3 May 2006
  • ...to create, implement, and maintain a best practice, risk management-based information security program.<br> ...to create, implement, and maintain a best practice, risk management-based Information Security Program.<br> ...
    5 KB (705 words) - 11:39, 30 May 2015
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'' ...
    2 KB (321 words) - 15:35, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or inadequately tested. Systems produce ...
    4 KB (530 words) - 11:58, 23 June 2006
View ( | ) (20 | 50 | 100 | 250 | 500)