Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ==Information Security Audit== ...rom auditing the physical security of data centers to the auditing logical security of databases and highlights key components to look for and different method ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...software is available. When a system needs hardware or software upgrade, a computer technician can access the configuration management program and database to ...ount management]], [[fault management]], [[performance management]], and [[security management]].<br> ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ## Virus detection shall not be disabled on any computer resources equipped with anti-virus protection. ...tware upgrades shall be expedited, as necessary, to effectively respond to security advisories or findings from assessment and monitoring activities. ...
    5 KB (765 words) - 20:00, 15 January 2014
  • ...recognize the wide variation in the size (e.g., large mainframe vs. small network) and structure (e.g., centralized vs. decentralized) of the many processing ...stionnaire, financially significant information systems are defined as the computer hardware and software, including system programs and application programs, ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • * [[Purpose of computer crime laws]] * [[Computer]] ...
    9 KB (1,069 words) - 20:29, 22 February 2009
  • :1. physical access, e.g. to offices, computer rooms, filing cabinets; :3. network connectivity between the organization’s and the external party’s network(s), e.g. permanent connection, remote access; ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • * dcfldd : US DoD Computer Forensics Lab version of dd * nipper 0.12.0 : quickly document network device configuration (including cisco, juniper, checkpoint, sonicwall and m ...
    8 KB (1,058 words) - 12:30, 5 August 2011
  • ...oftware and hardware, is relatively easy to implement, and requires little computer memory. As a new encryption standard, it is currently being deployed on a l ...e state; it cyclically shifts the bytes in each row by a certain [[Offset (computer science)|offset]]. For AES, the first row is left unchanged. Each byte of t ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ...he Secretary of Commerce of standards and guidelines pertaining to Federal computer systems; (5) designate executive agents for information technology acquisit ...ive such standards when compliance would adversely affect the mission of a computer operator or cause a major adverse financial impact on such operator which i ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • Network Working Group E. Guttman Users' Security Handbook ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • '''Can you mitigate database security risks?'''<br> ...ng data for order fulfillment, employee identification data such as social security numbers, and storing customer data such as shipping addresses and credit ca ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...a law enforcement problem, but poses a serious national and international security threat as well. ...rrorist activity to law enforcement using the Financial Crimes Enforcement Network's ("FinCEN") Financial Institutions Hotline at 1-866-556-3974. The hotline ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • ...0.14:| '''SOX.2.0.14''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contrac :::f. [[SOX.2.0.16:| '''SOX.2.0.16''']] A regular review of security, availability and processing integrity is performed by third-party service ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...force the security controls we need to comply with the companies corporate security policy.<br> * Authorization and user security administration ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...veryday life; examples include security of automated teller machine cards, computer passwords, and electronic commerce all depend on cryptography. ...ccessive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and m ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • :* Information Security :* SP-9; Interagency Supervisory Statement on EFT Switches and Network Services, April 1993 ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ::* Regulatory, audit, and security reports from key service providers ...rts, resolution of audit findings, format and contents of work papers, and security over audit materials.<br> ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...electronic documents or business data from one computer system to another computer system, i.e. from one trading partner to another trading partner without hu ..., specifying that "in EDI, the usual processing of received messages is by computer only. Human intervention in the processing of a received message is typical ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ...c Operational Readiness Security Evaluation is a comprehensive information security framework designed to be accessible, extensible, comprehensive, and collabo ...| COBIT]]) is another approach to standardize good information technology security and control practices. This is done by providing tools to assess and measu ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ===Title III: Computer Maintenance Competition Assurance Act=== ...computers could make certain temporary, limited copies while working on a computer. ...
    26 KB (3,969 words) - 11:00, 30 October 2011
View ( | ) (20 | 50 | 100 | 250 | 500)