Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...Policy''']] defines objectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...le Vulnerability Assessment and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']], and provides specific instructions and requirem ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • ::'''(B)''' an assessment of the development, promulgation, and adoption of, and compliance with, sta ...isruption, modification, or destruction of which would have a debilitating impact on the mission of the Department of Defense.<br> ...
    4 KB (671 words) - 10:44, 1 June 2010
  • :* Impact of IT - The steering committee should understand the relationship between t ...agement Policy, Vulnerability Assessment and Management Policy, and Threat Assessment and Monitoring Policy.<br> ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...blished in the [[Sample_Threat_Assessment_and_Monitoring_Policy:|'''Threat Assessment and Monitoring Standard''']], and provides specific requirements for develo ...tments as necessary to coordinate, in advance, responses that may directly impact those departments. ...
    5 KB (737 words) - 15:24, 21 January 2014
  • * Standards for categorizing information and information systems by mission impact. ...ducts and services used in security control implementation. The security assessment services will determine the extent to which the security controls are imple ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • [[AI6.2:| 6.2 Impact Assessment, Prioritization and Authorization]]<br> ...
    3 KB (341 words) - 19:07, 14 June 2007
  • ...Policy''']] defines objectives for establishing specific standards on the assessment and ongoing monitoring of threats to Company information assets.<br> ...in the [[Sample Threat Assessment and Monitoring Policy:|'''Sample Threat Assessment and Monitoring Policy''']], and provides specific instructions and requirem ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • :* Business impact analysis (BIA) :* Risk assessment ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ...uidelines''' defines objectives for establishing specific standards on the assessment and ongoing management of wireless technologies utilized for the extension ...sk is present if a threat can exploit an actual vulnerability to adversely impact a sensitive information asset.<br> ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ...nts assessment: ibm db2 records manager and r... | Compliance requirements assessment: ibm db2 records manager and r...]] #[[E-billing in Europe and the Impact of VAT | E-billing in Europe and the Impact of VAT]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...hannels, should carefully consider customer expectations and the potential impact of service disruptions on customer satisfaction and loyalty.<br> ...should determine the appropriate level of security controls based on their assessment of the sensitivity of the information to the customer and to the institutio ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...bility of that event as the Single Loss Expectancy (SLE) and the resulting impact of the occurrence, otherwise known as the Annualized Loss Expectancy (ALE) ...following list provides a brief description of each security goal and the impact of its not being met:<br> ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ::*Impact on production environment<br> <tr><td>'''Critical'''</td><td>Severe business or production impact, if not implemented immediately.<br> <br>Mandatory and must be implemented. ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...cations and related systems. Deficiencies in this area could significantly impact financial reporting and disclosure of an entity. For instance, insufficient ...nformation processing facilities or information of an organization, a risk assessment (see also Section 4) should be carried out to identify any requirements for ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ...ion and security monitoring. Deficiencies in this area could significantly impact financial reporting. For instance, insufficient controls over transaction a ...that identifies threats, and vulnerabilities, and results in a formal risk assessment. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ...tion of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities. Risk Please refer to [[Risk_Assessment_and_Treatment: | Risk Assessment and Treatment]] for additional information pertaining to enterprise risk ma ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...essments within the functional risk management areas. An effective IT risk assessment process will improve policy and internal controls decisions across the orga ...all institutions with less complex systems may have a more simplified risk assessment process. Regardless of the complexity, the process should be formal and sho ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • =='''Vulnerability Assessment'''== ...ctivity web page is a regularly updated summary of the most frequent, high-impact types of security incidents currently being reported to the US-CERT.<br> ...
    8 KB (1,058 words) - 12:30, 5 August 2011
  • ...n Guidelines defines objectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...sk is present if a threat can exploit an actual vulnerability to adversely impact a sensitive information asset.<br> ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • To minimize the impact of cascading vulnerabilities, keep your systems up-to-date with security pa ===<font color=maroon>'''The performance impact of encryption'''</font>=== ...
    28 KB (4,261 words) - 11:45, 28 March 2008
View ( | ) (20 | 50 | 100 | 250 | 500)