Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...plication security and availability requirements in response to identified risks, in line with data classification, the organization’s information security ...
    3 KB (374 words) - 15:05, 3 May 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (394 words) - 17:12, 22 March 2007
  • ...mplemented to enable the use of protection profiles and otherwise mitigate risks to data. If protection profiles are not used, the policies should accompl ...ts. Additionally, the devices may be lost or stolen. Mitigation of those risks typically involves encryption of sensitive data, host-provided access contr ...
    9 KB (1,246 words) - 18:20, 10 April 2007
  • ::'''(C)''' implementing policies and procedures to cost-effectively reduce risks to an acceptable level; and<br> ::'''(B)''' cost-effectively reduce information security risks to an acceptable level;<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...curity staff should receive ongoing security training that covers emerging risks to sensitive Company information assets and the latest security trends. ...
    2 KB (275 words) - 17:10, 23 January 2014
  • DIACAP also uses weighted metrics to describe risks and their mitigation. ...
    2 KB (229 words) - 10:14, 15 April 2012
  • Identify and mitigate risks relating to suppliers’ ability to continue effective service delivery in a :::a. [[SOX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in t ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ::'''(C)''' implementing policies and procedures to cost-effectively reduce risks to an acceptable level; and<br> ::'''(B)''' cost-effectively reduce information security risks to an acceptable level;<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • ...ute to the enterprise’s strategic objectives (goals) and related costs and risks. It includes how IT will support IT-enabled investment programs and operati ...
    3 KB (424 words) - 17:01, 21 June 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (442 words) - 13:59, 23 June 2006
  • ...formation Security Program to manage Information Security-related business risks.<br> ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...re based on risk assessments, cost-effectively reduce information security risks to an acceptable level, and ensure that information security is addressed t ...lying with organizational policies and procedures designed to reduce these risks ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • :* What single points of failure exist and how significant are those risks? ...
    3 KB (453 words) - 18:45, 25 April 2007
  • ::'''2. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (471 words) - 12:32, 23 June 2006
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    3 KB (460 words) - 16:08, 21 June 2006
  • ...ion assurance (IA)''' is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or ...fully considered. Thus, the IA practitioner does not seek to eliminate all risks, were that possible, but to manage them in the most [[cost-effective]] way. ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...der future flexibility for capacity additions, transition costs, technical risks and the lifetime of the investment for technology upgrades. Assess the comp ...
    4 KB (496 words) - 17:26, 21 June 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (497 words) - 14:57, 23 June 2006
  • ::'''2. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    4 KB (517 words) - 18:12, 21 June 2006
View ( | ) (20 | 50 | 100 | 250 | 500)