Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...upport the institution’s technology needs, the ultimate responsibility and risk rests with the institution. Financial institutions are required under the 5 ...ey are maintaining those controls when indicated by the institution’s risk assessment ...
    6 KB (829 words) - 19:14, 17 April 2007
  • ::'''(B)''' an assessment (made on the basis of the results of the testing) of compliance with—<br> ...ny information security vulnerability in such system commensurate with the risk and in accordance with all applicable laws.<br> ...
    4 KB (634 words) - 13:00, 4 June 2010
  • ...ionally, the degree of internal access granted to some users increases the risk of accidental damage or loss of information and systems.<br> '''Risk exposures from internal users include:''' ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • * Proposing methodologies and processes (e.g., risk assessment) subject to management approval<br> * A risk assessment to identify any requirements for specific controls, taking into account cha ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ...ct and secure operation of information processing facilities; minimize the risk of systems failures; protect the integrity of software and information; mai ...lan should address the budget, periodic board reporting, and the status of risk management controls.<br> ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...ertificates. Certification involves a multistage process with a number of assessment visits. After the initial certification activities and issue of a certific ...beginners guide but describes the overall processes, its relationship with risk management and reasons for an organization to implement along with the bene ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ==Transaction or Operations Risk== ...risk exists in each product and service offered. The level of transaction risk is affected by the structure of the institution’s processing environment, i ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...nformation_Security_Audit | audit]] activities, such as control and [[risk assessment]]s, on a more frequent basis. Technology plays a key role in continuous aud ...hile there are alternatives to ITAM, it is widely held that it is the best assessment application available and seamlessly supports the former continuous auditin ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...process, access to a credit report is critical for a lender to make a risk assessment. Because a credit freeze effectively stops any access to the credit report, ...ue a loan in the borrower's name. Hence, credit freezing should reduce the risk that loans or credit cards will be issued fraudulently. Credit freezes do h ...
    4 KB (663 words) - 12:59, 12 November 2011
  • ...that identifies threats, and vulnerabilities, and results in a formal risk assessment.]]<br> ...ntrol.jpg]][[PCI-12.7:|PCI-12.7 Screen potential employees to minimize the risk of attacks from internal sources.]]<br> ...
    7 KB (988 words) - 19:11, 7 July 2006
  • [[AI1.2:| 1.2 Risk Analysis Report]]<br> [[AI6.2:| 6.2 Impact Assessment, Prioritization and Authorization]]<br> ...
    3 KB (341 words) - 19:07, 14 June 2007
  • ...zone. The requirements for each zone should be determined through the risk assessment.<br> '''The risk assessment should include, but is not limited to, the following threats:'''<br> ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actuarial assessments ...of the risk, and accepting some or all of the consequences of a particular risk. ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...anized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by the exercise of vul ...am for a commercial enterprise, the processes of calculating the cost of a risk exposure and what the appropriate costs of mitigating those risks should be ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...ost and Risk of Complex Matters | Active Management to Reduce the Cost and Risk of Complex Matters]] ...the risk a... | Avoid that feeling of uncertainty: the power to reduce the risk a...]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...refers to the formal authorization for system operation and acceptance of risk by an accrediting authority.<br> ::1. Risk Assessment:<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...uidelines''' defines objectives for establishing specific standards on the assessment and ongoing management of wireless technologies utilized for the extension ...refers to the likelihood of loss, damage, or injury to information assets. Risk is present if a threat can exploit an actual vulnerability to adversely imp ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • '''Risk Association Control Activities:''' ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ...nvestment practices. Generally speaking, these rules mean that the greater risk to which the bank is exposed, the greater the amount of capital the bank ne # Ensuring that Capital requirement is more risk sensitive; ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ==Risk Association Control Activities:== ...s and security staff, and specialist skills in areas such as insurance and risk management.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
View ( | ) (20 | 50 | 100 | 250 | 500)