Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ==Communications and Operations Management== ...y and cost effective service to client financial institutions. Institution management should monitor any changes in the current strategies and plans of independe ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ==Security Management== ...urity Management is based on the code of practice for information security management also known as ISO/IEC 17799. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • :::a. [[SOX.2.0.8:|'''SOX.2.0.8''']] IT management has established procedures across the organization to protect information s :::a. SOX.3.1.1: Management should monitor security incidents and the extent of compliance with informa ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ...Name>''' (the "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for prop ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for the de ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...equiring expertise in accounting, fraud examination, [[forensic science]], management science, systems engineering, [[security engineering]], and [[criminology]] ...]], policies and procedures requiring such controls as regular backups and configuration hardening, employee training in security awareness, or organizing personnel ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...checking software, combined with strict change controls and configuration management. ...
    4 KB (568 words) - 17:25, 10 April 2007
  • :::a. SOX.3.1.2: The configuration of operating systems for application systems (servers) should support an ac ...rative access. Use technologies such as SSH, VPN, or SSL/TLS for web-based management and other non-console administrative access.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • * [[PCI 1:|'''Requirement 1: Install and maintain a firewall configuration to protect data.''']] '''Maintain a Vulnerability Management Program''' ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • =='''Sample Life Cycle Management Standard'''== ...Name>''' (the "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for prop ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...f making data unavailable should anything go wrong with data handling, key management, or the actual encryption. For example, a loss of encryption keys or other # Effective key management practices ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • ::'''(C)''' ensuring that information security management processes are integrated with agency strategic and operational planning pro :::'''(iii)''' minimally acceptable system configuration requirements, as determined by the agency; and<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ::5. All signatures and configuration of Company threat monitoring or intrusion detection technologies should be ...o attempts to deactivate, modify, or delete signatures, auditing features, configuration files, and/or audit logs.<br> ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ::'''(C)''' ensuring that information security management processes are integrated with agency strategic and operational planning pro :::'''(iii)''' minimally acceptable system configuration requirements, as determined by the agency; and<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • ...the agencies and revised, if necessary, based on examiner feedback. Senior management of each agency performed the final review and approval and then formally re :* IT Management ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source sof ===Extend vulnerability management to open-source solutions.=== ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...ormation Security Committee is comprised of lawyers, government policy and management professionals, information technology and security professionals, notaries ...in order to improve security. This document is about basic, "boilerplate" configuration items that are almost universally applicable in IP networks, and about a fe ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...browser security settings to be less restrictive than the Company-approved configuration.<br> ...cated and understood within their respective organizational units. Company management also is responsible for defining, approving, and implementing processes and ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • * Authentication and password management # Database Configuration ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...Name>''' (the "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for prop ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for follow ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]]s that are intended to support businesses in achieving both qu ...s (hence the term ''Library''), each of which covers a core area within IT Management. The names ''ITIL'' and ''IT Infrastructure Library'' are Registered Trade ...
    37 KB (5,348 words) - 10:12, 8 September 2011
View ( | ) (20 | 50 | 100 | 250 | 500)