Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ==Information Security Policy== ...is category is to provide management direction and support for information security in accordance with business requirements and all relevant laws, regulations ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ::'''2. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...OX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contrac ...
    2 KB (291 words) - 16:02, 25 June 2006
  • ::'''2. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...accepted compliance with the organization’s policies and procedures, e.g., security policies and procedures. ...
    3 KB (385 words) - 16:14, 25 June 2006
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    2 KB (351 words) - 13:57, 4 May 2006
  • ...ts (NDA), escrow contracts, continued supplier viability, conformance with security requirements, alternative suppliers, penalties and rewards, etc.<br> ::'''1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    7 KB (958 words) - 16:01, 25 June 2006
  • '''DS 5.6 Security Incident Definition'''<br> ...ent process. Characteristics include a description of what is considered a security incident and its impact level. A limited number of impact levels are define ...
    4 KB (548 words) - 14:21, 4 May 2006
  • What are assets? Asset Management from a corporate governance and information security perspective is not just about 'IT' Assets. It is about the management, cont ...is taken from and attributable to UK-National Health Services Information Security it I believe adequately covers what we can do/do with data. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...ology standards and practices based on their business relevance, risks and compliance with external requirements.<br> ISO 17799 4.1 Information security infrastructure.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...nsurance carriers. Coverage is increasingly available to cover risks from security breaches or denial of service attacks. Several insurance companies offer e '''When evaluating the need for insurance to cover information security threats, financial institutions should understand the following points:''' ...
    3 KB (469 words) - 13:30, 10 April 2007
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    3 KB (451 words) - 17:52, 5 May 2006
  • =='''Information Security Presentation Samples'''== ...anization can use and tailor these presentation samples to support ongoing security awareness and training efforts.<br> ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...ment 2: Do not use vendor-supplied defaults for system passwords and other security parameters.''']] * [[PCI 11:|'''Requirement 11: Regularly test security systems and processes.''']] ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • The objective of this category is to manage information security within the organization's overall administrative structure.<br> ===Management commitment to information security=== ...
    8 KB (996 words) - 12:49, 22 May 2007
  • [[Security Policy:|'''Security Policy''']]<br> [[Organizing Information Security:|'''Organizing Information Security''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ==Personnel Security== ...rs grant legitimate users system access necessary to perform their duties; security personnel enforce access rights in accordance with institution standards. B ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ::'''1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ::'''2. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (408 words) - 16:10, 25 June 2006
  • ...ds and guidelines. The policies should address key topics such as quality, security, confidentiality, internal controls and intellectual property. Their releva ...1:|'''SOX.2.7.1''']] End-user computing policies and procedures concerning security, availability and processing integrity exist and are followed.<br> ...
    3 KB (421 words) - 18:02, 23 June 2006
  • ISO 17799 3.1 Information security policy.<br> ISO 17799 4.1 Information security infrastructure.<br> ...
    3 KB (377 words) - 14:55, 1 May 2006
  • ISO 17799 4.2 Security of third-party access.<br> ISO 17799 6.1 Security in job definition and resourcing.<br> ...
    2 KB (330 words) - 18:17, 1 May 2006
  • ==Welcome to the Holistic Operational Readiness Security Evaluation (HORSE) project Wiki.== ...ging the growth, development and distribution of free, multilingual, cyber security focused educational content, and to providing the full content of this wiki ...
    9 KB (1,241 words) - 20:49, 13 September 2016
View ( | ) (20 | 50 | 100 | 250 | 500)