Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...plemented (Do) and the implementation is then evaluated (Check). After the evaluation the both the plans and the implementation of the plan are maintained (Act). ...velopment of security plans, the implementation of the security plans, the evaluation and how the results of the evaluations are translated into action plans. Fu ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...st, and report on whether a system meets certain principles and associated evaluation criteria. One of those principles is security. ...S 70 report in many important respects. The primary difference is that the evaluation criteria are uniform for all WebTrust and SysTrust reports. ...
    6 KB (829 words) - 19:14, 17 April 2007
  • [[Category:Evaluation]] ...
    2 KB (401 words) - 20:33, 28 July 2009
  • ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...e needed in the relevant position, and are suitable for use in performance evaluation. Role descriptions should contain the responsibility for internal control.< ...
    3 KB (427 words) - 17:58, 1 May 2006
  • ...the interview, counsel should develop as many leads for investigation and evaluation of the case as possible. Therefore, questions about the relationship of the ...
    3 KB (498 words) - 13:29, 22 February 2009
  • [[DS7.3:| 7.3 Evaluation of Training Received]]<br> ...
    4 KB (538 words) - 19:08, 14 June 2007
  • # Specified officials for audit or evaluation purposes; ...
    3 KB (470 words) - 19:08, 19 April 2010
  • * Periodic testing and evaluation of the effectiveness of information security policies, procedures, practice ...ut will be incorporated into Phase II and use existing IT product testing, evaluation, and validation programs.<br> ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • :'''(5)''' periodic testing and evaluation of the effectiveness of information security policies, procedures, and prac ::'''(B)''' may include testing relied on in a [1] evaluation under section 3535;<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • :'''(5)''' periodic testing and evaluation of the effectiveness of information security policies, procedures, and prac ::'''(B)''' may include testing relied on in a [1] evaluation under section 3545;<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • | The Auditor's Study and Evaluation of Internal Control | The Effects of EDP on the Auditor's Study and Evaluation of Internal Control ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • :*'''Configuration Control:'''The evaluation, coordination, and approval of all changes to the equipment configuration d ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ...gned and monitored. Establish fair, transparent, repeatable and comparable evaluation of business cases including financial worth, the risk of not delivering a c ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ## SIRT incident response capabilities shall be exercised, for evaluation purposes, at least annually. However, the SIRT members (with the possible e ...
    5 KB (737 words) - 15:24, 21 January 2014
  • [[PO7.7:| 7.7 Employee Job Performance Evaluation]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...ormal procedures for the deposit and recording of change requests, for the evaluation of costs and impacts, and finally for the acceptation, modification, or rej ...ld be checked by a [[software audit]]. This activity covers an independent evaluation of the conformance of the configuration item under study. Audits are conduc ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ...of the Air Force study was a model for the military to use as an objective evaluation of software subcontractors' process capability maturity. Humphrey based thi ...assessed using a process maturity questionnaire and a Software Capability Evaluation method devised by Humphrey and his colleagues at the Software Engineering I ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • * A formal plan for testing and acceptance, including independent evaluation where appropriate ...
    9 KB (1,170 words) - 14:05, 22 May 2007
View ( | ) (20 | 50 | 100 | 250 | 500)