Search results
Jump to navigation
Jump to search
- ==Information Security Policy== ...is category is to provide management direction and support for information security in accordance with business requirements and all relevant laws, regulations ...8 KB (1,063 words) - 13:25, 23 May 2007
- ::'''2. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...OX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contrac ...2 KB (291 words) - 16:02, 25 June 2006
- ::'''2. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...accepted compliance with the organization’s policies and procedures, e.g., security policies and procedures. ...3 KB (385 words) - 16:14, 25 June 2006
- ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...2 KB (351 words) - 13:57, 4 May 2006
- ...ts (NDA), escrow contracts, continued supplier viability, conformance with security requirements, alternative suppliers, penalties and rewards, etc.<br> ::'''1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...7 KB (958 words) - 16:01, 25 June 2006
- '''DS 5.6 Security Incident Definition'''<br> ...ent process. Characteristics include a description of what is considered a security incident and its impact level. A limited number of impact levels are define ...4 KB (548 words) - 14:21, 4 May 2006
- What are assets? Asset Management from a corporate governance and information security perspective is not just about 'IT' Assets. It is about the management, cont ...is taken from and attributable to UK-National Health Services Information Security it I believe adequately covers what we can do/do with data. ...5 KB (705 words) - 13:29, 23 May 2007
- ...ology standards and practices based on their business relevance, risks and compliance with external requirements.<br> ISO 17799 4.1 Information security infrastructure.<br> ...2 KB (311 words) - 16:29, 1 May 2006
- ...nsurance carriers. Coverage is increasingly available to cover risks from security breaches or denial of service attacks. Several insurance companies offer e '''When evaluating the need for insurance to cover information security threats, financial institutions should understand the following points:''' ...3 KB (469 words) - 13:30, 10 April 2007
- ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...3 KB (451 words) - 17:52, 5 May 2006
- =='''Information Security Presentation Samples'''== ...anization can use and tailor these presentation samples to support ongoing security awareness and training efforts.<br> ...5 KB (653 words) - 12:45, 25 April 2007
- ...ment 2: Do not use vendor-supplied defaults for system passwords and other security parameters.''']] * [[PCI 11:|'''Requirement 11: Regularly test security systems and processes.''']] ...8 KB (1,208 words) - 17:00, 9 April 2007
- The objective of this category is to manage information security within the organization's overall administrative structure.<br> ===Management commitment to information security=== ...8 KB (996 words) - 12:49, 22 May 2007
- [[Security Policy:|'''Security Policy''']]<br> [[Organizing Information Security:|'''Organizing Information Security''']]<br> ...3 KB (378 words) - 21:27, 18 January 2015
- ==Personnel Security== ...rs grant legitimate users system access necessary to perform their duties; security personnel enforce access rights in accordance with institution standards. B ...10 KB (1,327 words) - 12:54, 10 April 2007
- ::'''1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ::'''2. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...3 KB (408 words) - 16:10, 25 June 2006
- ...ds and guidelines. The policies should address key topics such as quality, security, confidentiality, internal controls and intellectual property. Their releva ...1:|'''SOX.2.7.1''']] End-user computing policies and procedures concerning security, availability and processing integrity exist and are followed.<br> ...3 KB (421 words) - 18:02, 23 June 2006
- ISO 17799 3.1 Information security policy.<br> ISO 17799 4.1 Information security infrastructure.<br> ...3 KB (377 words) - 14:55, 1 May 2006
- ISO 17799 4.2 Security of third-party access.<br> ISO 17799 6.1 Security in job definition and resourcing.<br> ...2 KB (330 words) - 18:17, 1 May 2006
- ==Welcome to the Holistic Operational Readiness Security Evaluation (HORSE) project Wiki.== ...ging the growth, development and distribution of free, multilingual, cyber security focused educational content, and to providing the full content of this wiki ...9 KB (1,241 words) - 20:49, 13 September 2016