Search results

Jump to navigation Jump to search
  • ==Annual independent evaluation== :'''(1)''' Each year each agency shall have performed an independent evaluation of the information security program and practices of that agency to determi ...
    4 KB (682 words) - 19:17, 3 June 2010
  • ==Annual independent evaluation== :'''(1)''' Each year each agency shall have performed an independent evaluation of the information security program and practices of that agency to determi ...
    4 KB (634 words) - 13:00, 4 June 2010
  • '''DS 7.3 Evaluation of Training Received '''<br> ...capturing and retention of knowledge, cost and value. The results of this evaluation should serve as input for future curriculum definition and training session ...
    2 KB (247 words) - 17:11, 5 May 2006
  • '''PO 7.7 Employee Job Performance Evaluation'''<br> Require timely evaluation to be performed on a regular basis against individual objectives derived fr ...
    2 KB (284 words) - 19:38, 1 May 2006
  • ...ality assurance]] testing of new or modified information systems, a formal evaluation and approval of the test results by management of the affected user departm ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • * [[44_USC_3535 | 3535. Annual independent evaluation]] * [[44_USC_3545 | 3545. Annual independent evaluation]] ...
    2 KB (207 words) - 11:58, 23 May 2010
  • [[ME3.3:| 3.3 Evaluation of Compliance with Regulatory Requirements]]<br> ...
    2 KB (195 words) - 19:06, 14 June 2007
  • ...s Security Evaluation Overview:|'''Holistic Operational Readiness Security Evaluation Overview.''']]<br> :Holistic Operational Readiness Security Evaluation - Comprehensive information security control and risk assessment guidance f ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    5 KB (649 words) - 18:23, 5 May 2006
  • '''Holistic Operational Readiness Security Evaluation (HORSE) Project Wiki''' is evolving every day. There are information securi ...
    2 KB (280 words) - 11:17, 30 November 2008
  • 1. Conduct an evaluation of the frequency and timeliness of management’s review of configuration rec ...
    2 KB (324 words) - 18:46, 25 June 2006
  • '''ME 3.3 Evaluation of Compliance with Regulatory Requirements'''<br> ...
    2 KB (271 words) - 13:16, 4 May 2006
  • '''EVALUATION OF CONTROLS IN INFORMATION SYSTEMS (IS) QUESTIONNAIRE'''<br> In order to expedite the IS controls evaluation process, this questionnaire is designed to be completed by the insurance co ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...e manuals, online help, service desk support, key user identification, and evaluation.<br> ...
    2 KB (298 words) - 16:59, 3 May 2006
  • ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ==Welcome to the Holistic Operational Readiness Security Evaluation (HORSE) project Wiki.== ...ncompass any legislative requirement or industry requirement with a common evaluation framework. The HORSE framework guides the organization through a single aud ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...plemented (Do) and the implementation is then evaluated (Check). After the evaluation the both the plans and the implementation of the plan are maintained (Act). ...velopment of security plans, the implementation of the security plans, the evaluation and how the results of the evaluations are translated into action plans. Fu ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...st, and report on whether a system meets certain principles and associated evaluation criteria. One of those principles is security. ...S 70 report in many important respects. The primary difference is that the evaluation criteria are uniform for all WebTrust and SysTrust reports. ...
    6 KB (829 words) - 19:14, 17 April 2007
  • [[Category:Evaluation]] ...
    2 KB (401 words) - 20:33, 28 July 2009
  • ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...e needed in the relevant position, and are suitable for use in performance evaluation. Role descriptions should contain the responsibility for internal control.< ...
    3 KB (427 words) - 17:58, 1 May 2006
  • ...the interview, counsel should develop as many leads for investigation and evaluation of the case as possible. Therefore, questions about the relationship of the ...
    3 KB (498 words) - 13:29, 22 February 2009
  • [[DS7.3:| 7.3 Evaluation of Training Received]]<br> ...
    4 KB (538 words) - 19:08, 14 June 2007
  • # Specified officials for audit or evaluation purposes; ...
    3 KB (470 words) - 19:08, 19 April 2010
  • * Periodic testing and evaluation of the effectiveness of information security policies, procedures, practice ...ut will be incorporated into Phase II and use existing IT product testing, evaluation, and validation programs.<br> ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • :'''(5)''' periodic testing and evaluation of the effectiveness of information security policies, procedures, and prac ::'''(B)''' may include testing relied on in a [1] evaluation under section 3535;<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • :'''(5)''' periodic testing and evaluation of the effectiveness of information security policies, procedures, and prac ::'''(B)''' may include testing relied on in a [1] evaluation under section 3545;<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • | The Auditor's Study and Evaluation of Internal Control | The Effects of EDP on the Auditor's Study and Evaluation of Internal Control ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • :*'''Configuration Control:'''The evaluation, coordination, and approval of all changes to the equipment configuration d ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ...gned and monitored. Establish fair, transparent, repeatable and comparable evaluation of business cases including financial worth, the risk of not delivering a c ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ## SIRT incident response capabilities shall be exercised, for evaluation purposes, at least annually. However, the SIRT members (with the possible e ...
    5 KB (737 words) - 15:24, 21 January 2014
  • [[PO7.7:| 7.7 Employee Job Performance Evaluation]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...ormal procedures for the deposit and recording of change requests, for the evaluation of costs and impacts, and finally for the acceptation, modification, or rej ...ld be checked by a [[software audit]]. This activity covers an independent evaluation of the conformance of the configuration item under study. Audits are conduc ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ...of the Air Force study was a model for the military to use as an objective evaluation of software subcontractors' process capability maturity. Humphrey based thi ...assessed using a process maturity questionnaire and a Software Capability Evaluation method devised by Humphrey and his colleagues at the Software Engineering I ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • * A formal plan for testing and acceptance, including independent evaluation where appropriate ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • [[Category:Evaluation]] ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • :'''B. Change Review and Evaluation'''<br> ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ===Review and evaluation of the plan=== ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...technologists who understand that this methodology works for business risk evaluation is helpful as you build your business acumen; a valuable commodity if you a ...guard the mission of their organization; and the commitment to the ongoing evaluation and assessment of the IT-related business risks.<br> ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...orsewiki/ HORSE Project] (HORSE) - Holistic Operational Readiness Security Evaluation is a comprehensive information security framework designed to be accessible ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...collect and disseminate information about consumers to be used for credit evaluation and certain other purposes, including employment. Credit bureaus, a type of ...
    12 KB (1,814 words) - 12:01, 19 July 2012
  • ...ance of continuous auditing has its own pulse. The time frame selected for evaluation depends largely on the frequency of updates within the accounting informati ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ===Review and Evaluation of the Plan=== ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...l auditors typically review IT control procedures as part of their overall evaluation of internal controls when providing an opinion on the adequacy of an instit ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • :2. Analyze the internal auditor’s evaluation of IT controls and compare it with any evaluations done by examiners.<br> ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...Technical Support provides a number of specialist functions: Research and Evaluation, Market Intelligence (particularly for Design and Planning and Capacity Man ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...clusions about the effectiveness of their internal controls based on their evaluation as of that date.” ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...ad mostly out-side directors, who had no management ties, undertook formal evaluation of its directors, and was responsive to investors' requests for information ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...ntify and define the service offering itself, plus the supported products, evaluation criteria, and quality of service customers should expect. SLAs are typicall ...
    74 KB (11,078 words) - 13:08, 9 April 2007