Search results

Jump to navigation Jump to search
View (previous 250 | ) (20 | 50 | 100 | 250 | 500)
  • '''PO 9.1 IT and Business Risk Management Alignment'''<br> ...amework. This includes alignment with the organization’s risk appetite and risk tolerance level.<br> ...
    3 KB (377 words) - 14:10, 8 August 2006
  • '''PO 9.2 Establishment of Risk Context'''<br> ...comes. This includes determining the internal and external context of each risk assessment, the goal of the assessment and the criteria against which risks ...
    2 KB (317 words) - 20:10, 1 May 2006
  • '''ME 4.5 Risk Management'''<br> ...sight, and their actual and potential business impact. The enterprise’s IT risk position should be transparent to all stakeholders.<br> ...
    2 KB (334 words) - 13:36, 4 May 2006
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> ...by <Your Company Name> to gauge and promote end-user awareness of managing risk with the use of security processes.<br> ...
    2 KB (305 words) - 17:31, 3 August 2006
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> ...by <Your Company Name> to gauge and promote end-user awareness of managing risk with the use of security processes.<br> ...
    2 KB (309 words) - 17:34, 3 August 2006
  • '''DS 5.1 Management of IT Security'''<br> Manage IT security at the highest appropriate organizational level, so the management of security actions is in line with business requirements. ...
    3 KB (394 words) - 17:12, 22 March 2007
  • Provides a framework for consistent, timely, and cost-effective management decisions.<br> ...rds of all federal agencies receive a superior grade for efforts to secure information systems.'''<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • Provides a framework for consistent, timely, and cost-effective management decisions.<br> ...rds of all federal agencies receive a superior grade for efforts to secure information systems.'''<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • '''PO 4.8 Responsibility for Risk, Security and Compliance'''<br> ...ity issues. Obtain direction from senior management on the appetite for IT risk and approval of any residual IT risks.<br> ...
    3 KB (370 words) - 18:04, 1 May 2006
  • ==IT Risk Management Process== ...he ability to mitigate IT risks is dependent upon risk assessments. Senior management should identify, measure, control, and monitor technology to avoid risks th ...
    4 KB (528 words) - 16:58, 28 March 2010
  • [[Risk Assessment and Treatment:|'''Risk Assessment and Treatment''']]<br> [[Organizing Information Security:|'''Organizing Information Security''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ...g to a business and service priority and routed to the appropriate problem management team, and customers kept informed of the status of their queries. '''Risk Association Control Activities:'''<br> ...
    2 KB (299 words) - 17:41, 5 May 2006
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (290 words) - 17:49, 25 April 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: IT function does not meet the organizational needs.'''<br> ...
    3 KB (356 words) - 17:11, 1 May 2006
  • ==Change Management== ...anges (fixes) - with minimum risk to IT infrastructure. The goal of Change Management is to ensure that standardized methods and procedures are used for efficien ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ...rs, risk managers, the corporate compliance group, outsourcers and offsite management.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (342 words) - 18:20, 1 May 2006
  • ==IT Management Booklet== ...risk management processes to ensure effective information technology (IT) management.<br> ...
    5 KB (645 words) - 18:03, 27 April 2007
  • The problem management system should provide for adequate audit trail facilities that allow tracki ...rs on user services. In the event that this impact becomes severe, problem management should escalate the problem, perhaps referring it to an appropriate board t ...
    3 KB (451 words) - 17:52, 5 May 2006
  • ==Risk Association Control Activities:== ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (366 words) - 18:00, 25 April 2007
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (270 words) - 18:10, 25 April 2007
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (278 words) - 18:21, 25 April 2007
  • =='''Asset Management'''== ...It is about the management, control and protection of '''all''' aspects of Information / Data in whatever form for example paper records or X-Ray Film and fiche. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • Encourage IT management to define and execute ` procedures to ensure that the IT continuity plan is '''Risk Association Control Activities:'''<br> ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ...report and classify problems that have been identified as part of incident management. The steps involved in problem classification are similar to the steps in c '''Risk Association Control Activities:'''<br> ...
    4 KB (601 words) - 15:01, 8 August 2006
  • '''PO 10.2 Project Management Framework'''<br> ...should be integrated with the enterprise portfolio management and program management processes.<br> ...
    3 KB (367 words) - 16:28, 21 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Production processes and associated controls operate as intended and suppo ...
    3 KB (420 words) - 14:06, 8 August 2006
  • '''DS 2.2 Supplier Relationship Management'''<br> Formalize the supplier relationship management process for each supplier. The relationship owners must liaise on customer ...
    3 KB (408 words) - 16:10, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: IT function does not meet the organizational needs.'''<br> ...
    3 KB (393 words) - 17:18, 1 May 2006
  • ...sks and responsibilities of internal and external service providers, their management and their customers, and the rules and structures to document, test and exe '''Risk Association Control Activities:'''<br> ...
    3 KB (456 words) - 17:15, 15 February 2007
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (270 words) - 14:54, 5 May 2006
  • '''PO 2.4 Integrity Management'''<br> '''Risk Association Control Activities:'''<br> ...
    4 KB (550 words) - 14:34, 1 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: IT function does not meet the organizational needs.'''<br> ...
    2 KB (338 words) - 19:03, 17 April 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: The transfer of programs into the live environment may not be appropriatel ...
    3 KB (377 words) - 14:55, 1 May 2006
  • ...nd services. The framework should integrate with the corporate performance management system.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (301 words) - 12:27, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...
    2 KB (351 words) - 13:57, 4 May 2006
  • ==AI 4.2 Knowledge Transfer to Business Management== ...rocesses. The knowledge transfer should include access approval, privilege management, segregation of duties, automated business controls, backup/recovery, physi ...
    3 KB (362 words) - 23:55, 14 June 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Job schedules can be easily ignored or circumvented, resulting in processi ...
    3 KB (467 words) - 18:39, 5 May 2006
  • ...chnology - Security techniques - Code of practice for information security management''. The current standard is a revision of the version published in [[2000]], ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...tory compliance and continuity requirements. This is related/linked to the information architecture.<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (446 words) - 16:36, 1 May 2006
  • ...and responsibilities for all personnel in the organization in relation to information systems to allow sufficient authority to exercise the role and responsibili '''Risk Association Control Activities:'''<br> ...
    3 KB (427 words) - 17:58, 1 May 2006
  • ==Risk Association Control Activities:== ::'''1. Risk: Operational failures may not be identified and resolved in an appropriate, ...
    2 KB (297 words) - 18:35, 25 April 2007
  • '''Risk Association Control Activities:'''<br> ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    4 KB (517 words) - 18:12, 21 June 2006
  • '''DS 1.1 Service Level Management Framework'''<br> ...ogue. The framework defines the organizational structure for service level management, covering the roles, tasks and responsibilities of internal and external se ...
    4 KB (524 words) - 15:03, 25 June 2006
  • ...ine the nature of the impact— positive, negative or both—and maintain this information.<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (459 words) - 17:56, 21 June 2006
  • '''DS 11.6 Security Requirements for Data Management '''<br> '''Risk Association Control Activities:'''<br> ...
    5 KB (649 words) - 18:23, 5 May 2006
  • =='''Information Security Presentation Samples'''== ...iness Security Evaluation - Comprehensive information security control and risk assessment guidance for the enterprise demystified. This presentation was o ...
    5 KB (653 words) - 12:45, 25 April 2007
  • '''PO 1.6 IT Portfolio Management'''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (470 words) - 13:39, 6 March 2007
  • ...requirements regarding delivery of value from IT investments, appetite for risk, integrity, ethical values, staff competence, accountability and responsibi '''Risk Association Control Activities:'''<br> ...
    4 KB (580 words) - 18:00, 23 June 2006
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (303 words) - 18:16, 25 April 2007
  • ...steering committee (or equivalent) composed of executive, business and IT management to: Determine prioritization of IT-enabled investment programs in line with '''Risk Association Control Activities:'''<br> ...
    4 KB (506 words) - 20:00, 25 June 2006
  • '''DS 10.4 Integration of Change, Configuration and Problem Management '''<br> ...ents, integrate the related processes of change, configuration and problem management. Monitor how much effort is applied to firefighting rather than enabling bu ...
    2 KB (248 words) - 17:50, 5 May 2006
  • ...us communication program, supported by top management in action and words. Management should give specific attention to communicating IT security awareness and t '''Risk Association Control Activities:'''<br> ...
    3 KB (442 words) - 18:58, 1 May 2006
  • ...ation of IT resources for operations, projects and maintenance to maximize Information Technologies contribution to optimizing the return on the enterprise’s port '''Risk Association Control Activities:'''<br> ...
    2 KB (346 words) - 18:25, 1 May 2006
  • '''PO 9.5 Risk Response'''<br> ...fits and select responses that constrain residual risks within the defined risk tolerance levels.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • '''PO 10.3 Project Management Approach'''<br> Establish a project management approach commensurate with the size, complexity and regulatory requirements ...
    4 KB (594 words) - 19:50, 25 June 2006
  • ...799]], "Information Technology - Code of practice for information security management." in 2000. [[ISO/IEC 17799]] was then revised in June 2005 and finally inc ...security management system]] (ISMS), referring to the information security management structure and controls identified in BS 7799-2, which later became [[ISO/IE ...
    2 KB (249 words) - 10:56, 27 October 2012
  • <br>Produce reports of service desk activity to enable management to measure service performance and service response times and to identify t '''Risk Association Control Activities:'''<br> ...
    2 KB (264 words) - 17:42, 5 May 2006
  • ...software, facilities, technology, and user procedures) and ensure that the information security requirements are met by all components. The test data should be sa '''Risk Association Control Activities:'''<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Controls provide reasonable assurance that policies and procedures that de ...
    3 KB (471 words) - 12:32, 23 June 2006
  • ...that are needed to create, implement, and maintain a risk management-based Information Security Program that complies with SOX Section 404.<br> ...cies, and standards) that are needed to create, implement, and maintain an Information Security Program that complies with SOX Section 404.<br> ...
    1 KB (204 words) - 13:03, 14 July 2006
  • '''Risk Association Control Activities:''' ::'''1. Risk: Controls provide reasonable assurance that policies and procedures that de ...
    4 KB (537 words) - 13:57, 23 June 2006
  • '''PO 10.9 Project Risk Management'''<br> ...at have the potential to cause unwanted change. Risks faced by the project management process and the project deliverable should be established and centrally rec ...
    3 KB (403 words) - 12:37, 23 June 2006
  • ...anagement procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requ '''Risk Association Control Activities:'''<br> ...
    6 KB (819 words) - 13:54, 23 June 2006
  • '''DS 12.5 Physical Facilities Management '''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (268 words) - 15:01, 8 May 2006
  • ...er include access rights and privilege management, protection of sensitive information at all stages, authentication and transaction integrity, and automatic reco '''Risk Association Control Activities:'''<br> ...
    3 KB (374 words) - 15:05, 3 May 2006
  • ...t Operations Framework (MOF) 4.0''' is a series of guides aimed at helping information technology (IT) professionals establish and implement reliable, cost-effect ...| governance]], [[Risk_management | risk]], and [[compliance]] activities; management reviews, and Microsoft Solutions Framework (MSF) best practices.<br> ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...ual responsible for the function and which exceptions should be escalated. Management is also responsible to inform affected parties.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (289 words) - 13:11, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Operational failures may not be identified and resolved in an appropriate, ...
    2 KB (324 words) - 14:50, 4 May 2006
  • ...nd prioritization of any reported issue as an incident, service request or information request. Measure end users’ satisfaction with the quality of the service de '''Risk Association Control Activities:'''<br> ...
    2 KB (340 words) - 17:40, 5 May 2006
  • ...ual responsible for the function and which exceptions should be escalated. Management is also responsible to inform affected parties.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (289 words) - 12:56, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Systems do not meet business needs because not all business functional and ...
    4 KB (510 words) - 13:54, 1 May 2006
  • ...ange processes. The IT process framework should be integrated in a quality management system and the internal control framework.<br> ...ay provide invalid information, which could result in unreliable financial information and reports.<br> ...
    5 KB (699 words) - 19:59, 25 June 2006
  • '''MANAGEMENT CONTROL '''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (354 words) - 20:12, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...
    2 KB (303 words) - 17:36, 5 May 2006
  • ==Information Security Policy== ...ective of this category is to provide management direction and support for information security in accordance with business requirements and all relevant laws, re ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...d so security incidents can be properly treated by the incident or problem management process. Characteristics include a description of what is considered a secu '''Risk Association Control Activities:'''<br> ...
    4 KB (548 words) - 14:21, 4 May 2006
  • ...ata classification policy and the enterprise’s media storage practices. IT management should ensure that offsite arrangements are periodically assessed, at least '''Risk Association Control Activities:'''<br> ...
    5 KB (700 words) - 18:07, 23 June 2006
  • '''DS 2.3 Supplier Risk Management'''<br> ...iness standards in accordance with legal and regulatory requirements. Risk management should further consider non-disclosure agreements (NDA), escrow contracts, ...
    7 KB (958 words) - 16:01, 25 June 2006
  • '''PO 5.1 Financial Management Framework'''<br> ...these portfolios to the budget prioritization, cost management and benefit management processes.<br> ...
    2 KB (353 words) - 18:22, 1 May 2006
  • '''PO 6.2 Enterprise IT Risk and Internal Control Framework'''<br> ...be aimed at maximizing success of value delivery while minimizing risks to information assets through preventive measures, timely identification of irregularities ...
    2 KB (331 words) - 18:47, 1 May 2006
  • '''PO 9.4 Risk Assessment'''<br> ...e methods. The likelihood and impact associated with inherent and residual risk should be determined individually, by category and on a portfolio basis.<br ...
    2 KB (304 words) - 20:21, 1 May 2006
  • ...ormation requirements, IT configuration, information risk action plans and information security culture into an overall IT security plan. The plan is implemented '''Risk Association Control Activities:''' ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.'''<br> ...
    2 KB (327 words) - 13:18, 4 May 2006
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (272 words) - 18:05, 25 April 2007
  • ::'''1. Risk: Insufficient control over authorization, authentication, nonrepudiation, d ...y policy exists and has been approved by an appropriate level of executive management. ...
    3 KB (351 words) - 16:49, 25 June 2006
  • ...d standards controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> ...d support for information security. This section provides templates for an Information Security Program Charter and supporting policies that are required to compl ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Terminated entities create unacceptable control risks to the Company.'''<b ...
    3 KB (366 words) - 16:39, 26 June 2006
  • ...rization controls over the initiation of transactions, resulting financial information may not be reliable. '''Risk Association Control Activities:'''<br> ...
    5 KB (721 words) - 11:49, 28 March 2008
  • '''PO 9.6 Maintenance and Monitoring of a Risk Action Plan'''<br> ...s). Monitor execution of the plans, and report on any deviations to senior management.<br> ...
    2 KB (325 words) - 01:16, 2 May 2006
  • '''AI 2.9 Applications Requirements Management'''<br> ...being approved through an established [[Change_control | change control]] management process.<br> ...
    2 KB (274 words) - 13:47, 6 March 2007
  • Ensure that IT management, working with the business, defines a balanced set of performance objective * Risk and compliance with regulations.<br> ...
    3 KB (362 words) - 12:33, 4 May 2006
  • ==Information Security Aspects of Business Continuity Management== ..., interruptions to business activities and processes caused by failures of information systems. ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as ...
    6 KB (885 words) - 10:12, 23 March 2007
  • '''PO 8.1 Quality Management System'''<br> ...conformity. The QMS should define the organizational structure for quality management, covering the roles, tasks and responsibilities. All key areas develop thei ...
    2 KB (337 words) - 19:47, 1 May 2006
  • ...n repository and be properly integrated with change management and problem management procedures. '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...
    3 KB (429 words) - 18:55, 25 June 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (281 words) - 17:42, 5 May 2006
  • ...support of the business to initiate, record, process and report financial information. Deficiencies in this area could significantly impact an entity’s financial '''Risk Association Control Activities:''' ...
    4 KB (522 words) - 20:12, 25 June 2006
  • ...y to explain deviations and performance problems. Upon review, appropriate management action should be initiated and controlled.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (347 words) - 13:38, 4 May 2006
  • ...ves, or from programs, projects or service improvement initiatives. Change Management can ensure standardized methods, processes and procedures are used for all ==Change management in development projects== ...
    4 KB (523 words) - 10:24, 23 April 2010
  • * Review, negotiation and establishment of management responses.<br> * Assignment of responsibility for remediation (can include risk acceptance).<br> ...
    2 KB (286 words) - 13:05, 4 May 2006
  • ...t considers changes in the competitive environment, economies of scale for information systems staffing and investments, and improved interoperability of platform '''Risk Association Control Activities:'''<br> ...
    2 KB (351 words) - 17:03, 21 June 2006
  • '''PO 5.4 Cost Management'''<br> Implement a cost management process comparing actual costs to budgets. Costs should be monitored and re ...
    2 KB (303 words) - 18:29, 1 May 2006
  • '''DS 5.4 User Account Management'''<br> ...rmation are contractually arranged for all types of users. Perform regular management review of all accounts and related privileges.<br> ...
    6 KB (846 words) - 13:52, 4 May 2006
  • ...ools for operating, accessing and using the systems and services. Relevant information to consider is naming, version numbers and licensing details. A baseline of '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...
    4 KB (506 words) - 18:44, 25 June 2006
  • ...nge standards that require a post-implementation review of the operational information system to assess and report on whether the change met customer requirements '''Risk Association Control Activities:'''<br> ...
    3 KB (394 words) - 11:59, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: In-House and or Package applications may not meet all business and applica ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ==Security requirements of information systems== ...egory is to ensure that security is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...capacity forecasting of IT resources at regular intervals to minimize the risk of service disruptions due to insufficient capacity or performance degradat '''Risk Association Control Activities:'''<br> ...
    3 KB (490 words) - 13:42, 4 May 2006
  • ...deviations from expected performance should be identified, and appropriate management action should be initiated and reported.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (332 words) - 12:39, 4 May 2006
  • '''PO 10.1 Program Management Framework'''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (345 words) - 01:18, 2 May 2006
  • ...izing tasks, error tolerance mechanisms and resource allocation practices. Management should ensure that contingency plans properly address availability, capacit '''Risk Association Control Activities:'''<br> ...
    2 KB (284 words) - 14:37, 21 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...
    3 KB (460 words) - 16:08, 21 June 2006
  • '''DS 5.8 Cryptographic Key Management '''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (413 words) - 19:02, 4 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (333 words) - 16:42, 5 May 2006
  • ==PO 1.1 IT Value Management== ...including financial worth, the risk of not delivering a capability and the risk of not realizing the expected benefits.<br> ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ...urable and predictable by users to encourage proper use of resources. User management should be able to verify actual usage and charging of services. '''Risk Association Control Activities:'''<br> ...
    2 KB (305 words) - 14:51, 5 May 2006
  • ...es and procedures (e.g., hiring, positive work environment and orienting). Management implements processes to ensure that the organization has an appropriately d '''Risk Association Control Activities:'''<br> ...
    2 KB (312 words) - 18:19, 3 May 2006
  • ...to create, implement, and maintain a best practice, risk management-based information security program.<br> ...to create, implement, and maintain a best practice, risk management-based Information Security Program.<br> ...
    5 KB (705 words) - 11:39, 30 May 2015
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'' ...
    2 KB (321 words) - 15:35, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or inadequately tested. Systems produce ...
    4 KB (530 words) - 11:58, 23 June 2006
  • ::'''1. Risk: Up-to-date backups of programs and data may not be available when needed.' Determine if the management of third-party services has been assigned to appropriate individuals.<br> ...
    3 KB (335 words) - 14:05, 26 February 2007
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (296 words) - 17:59, 3 May 2006
  • The objective of this category is to manage information security within the organization's overall administrative structure.<br> ===Management commitment to information security=== ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ...systems and processes used for those purposes. While focused dominantly on information in digital form, the full range of IA encompasses not only digital but also Information assurance as a field has grown from the practice of [[information security]] which in turn grew out of practices and procedures of [[computer ...
    7 KB (983 words) - 10:41, 15 April 2012
  • '''PO 2.1 Enterprise Information Architecture Model'''<br> ...bed in PO1. The model facilitates the optimal creation, use and sharing of information by the business and in a way that maintains integrity and is flexible, func ...
    2 KB (311 words) - 14:12, 1 May 2006
  • [[PO1.1:| 1.1 IT Value Management]]<br> [[PO1.6:| 1.6 IT Portfolio Management]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...consider include validation against contractual terms, the organization’s information architecture, existing applications, interoperability with existing applica '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...
    4 KB (501 words) - 18:24, 25 June 2006
  • '''ME 4.4 Resource Management'''<br> ...current and future strategic objectives and keep up with business demands. Management should put clear, consistent and enforced human resources policies and proc ...
    2 KB (329 words) - 13:34, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Controls provide reasonable assurance that policies and procedures that de ...
    3 KB (432 words) - 12:23, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    5 KB (674 words) - 18:14, 21 June 2006
  • '''PO 6.3 IT Policies Management'''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (421 words) - 18:02, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Conflicting access credential may violate confidentiality, privacy, or pos ...
    3 KB (382 words) - 18:02, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Security and business continuity risks are introduced by technical designs ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...ication]] and [[accreditation]] (C&A) of a DoD IS that will maintain the [[information assurance]] (IA) posture throughout the [[Systems Development Life Cycle|sy ...DoDI 8500.2) as the primary set of security requirements for all automated information systems (AISs). The IA Controls are determined based on the system's [[mis ...
    2 KB (322 words) - 10:16, 15 April 2012
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Development and maintenance of system with potential impact to financial r ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...ces the possibility for a single individual to subvert a critical process. Management also makes sure that personnel are performing only authorized duties releva ==Risk Association Control Activities:== ...
    4 KB (591 words) - 19:45, 14 June 2007
  • ...iew, basis for payment, warranties, arbitration procedures, human resource management and compliance with the organization’s policies.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (319 words) - 17:09, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: The transfer of programs into the live environment is not appropriately co ...
    2 KB (346 words) - 20:00, 23 June 2006
  • ...nce framework including leadership, processes, roles and responsibilities, information requirements, and organizational structures to ensure that the enterprise’s '''Risk Association Control Activities:'''<br> ...
    3 KB (397 words) - 13:28, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...
    6 KB (804 words) - 12:14, 23 June 2006
  • Assess the performance of the existing plans and information systems in terms of contribution to business objectives, functionality, sta '''Risk Association Control Activities:'''<br> ...
    4 KB (586 words) - 01:37, 1 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    4 KB (544 words) - 17:11, 5 May 2006
  • '''DS 11.1 Business Requirements for Data Management '''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (244 words) - 17:51, 5 May 2006
  • ...d conditions of employment should stress the employee’s responsibility for information security, internal control and regulatory compliance. The level of supervis '''Risk Association Control Activities:'''<br> ...
    2 KB (329 words) - 19:26, 1 May 2006
  • ...aced the former process, known as '''DITSCAP''' ('''Department of Defense Information Technology Security Certification and Accreditation Process'''), in 2006. ...at will maintain the [[Information Assurance]] (IA) posture of the Defense Information Infrastructure (DII) throughout the [[Systems Development Life Cycle|system ...
    2 KB (229 words) - 10:14, 15 April 2012
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Design and implementation of new applications may not be appropriately con ...
    3 KB (424 words) - 17:01, 21 June 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    3 KB (377 words) - 18:52, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or inadequately tested. Systems produce ...
    3 KB (365 words) - 19:02, 17 April 2007
  • ...ate security patches and virus control) across the organization to protect information systems and technology from malware (viruses, worms, spy-ware, spam, intern '''Risk Association Control Activities:'''<br> ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ...sider include impact analysis, cost/benefit justification and requirements management.<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (425 words) - 13:19, 23 June 2006
  • '''Federal Information Security Management Act (FISMA)''' ...the implementation of and compliance with the Federal Information Security Management Act including: ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ::'''1. Risk: Without an adequate infrastructure, there is an increased risk that financial reporting applications will not be able to pass data between ...es in the business. When policies and procedures are changed, determine if management approves such changes. Select a sample of projects and determine that user ...
    3 KB (364 words) - 17:41, 21 June 2006
  • ...ess. Risk assessment is [[measurement|measuring]] two quantities of the [[risk]] ''R'', the magnitude of the potential loss ''L'', and the probability ''p :[[image:risk.jpg|thumb|400px|Risk]] ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (258 words) - 14:48, 5 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (263 words) - 12:37, 4 May 2006
  • '''DS 11.3 Media Library Management System '''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (401 words) - 11:50, 28 March 2008
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    3 KB (363 words) - 16:53, 9 April 2007
  • '''DS 5.3 Identity Management'''<br> ...iness needs and job requirements. User access rights are requested by user management, approved by system owner and implemented by the security-responsible perso ...
    6 KB (870 words) - 18:08, 21 June 2006
  • '''PO 5.5 Benefit Management'''<br> ...ibution, appropriate actions should be defined and taken. Where changes in Information Technologies contribution impact the program, or where changes to other rel ...
    3 KB (475 words) - 13:09, 23 June 2006
  • Ensure that quality management focuses on customers by determining their requirements and aligning them to '''Risk Association Control Activities:'''<br> ...
    2 KB (273 words) - 20:01, 1 May 2006
  • ...s granted to some users increases the risk of accidental damage or loss of information and systems.<br> '''Risk exposures from internal users include:''' ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • =='''Vulnerability Management Standard'''== ...jectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • ...demands. Enforce a disciplined approach to portfolio, program and project management, insisting that the business takes ownership of all IT-enabled investments '''Risk Association Control Activities:'''<br> ...
    3 KB (393 words) - 14:35, 21 June 2006
  • '''EVALUATION OF CONTROLS IN INFORMATION SYSTEMS (IS) QUESTIONNAIRE'''<br> ...estion. This can generally be achieved if the company involves an internal information systems auditor in the question answering process. Specific “Guidance Point ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (291 words) - 13:41, 6 March 2007
  • ...ssful resumption of the IT function after a disaster, determine whether IT management has established procedures for assessing the adequacy of the plan and updat '''Risk Association Control Activities:'''<br> ...
    2 KB (299 words) - 19:17, 22 June 2006
  • ..., so all stakeholders can take timely responsibility for the production of management, user and operational procedures, as a result of the introduction or upgrad '''Risk Association Control Activities:'''<br> ...
    2 KB (286 words) - 16:55, 3 May 2006
  • ...outsource the majority of their data processing, core processing, or other information technology systems or services are still expected to implement an appropria ...critical activities by the end of the business day could present systemic risk. The agencies believe that many, if not most, of the 15-20 major banks and ...
    5 KB (705 words) - 13:42, 30 May 2007
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...chnology - Security techniques - Code of practice for information security management''. ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (279 words) - 14:17, 3 May 2006
  • * Review, negotiation and establishment of management responses.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (284 words) - 12:41, 4 May 2006
  • Prepare a quality management plan that describes the project quality system and how it will be implement '''Risk Association Control Activities:'''<br> ...
    2 KB (295 words) - 01:42, 2 May 2006
  • '''AI 5.2 Supplier Contract Management'''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (287 words) - 17:04, 3 May 2006
  • Set up formal change management procedures to handle in a standardized manner all requests (including maint ...ay provide invalid information, which could result in unreliable financial information and reports.<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...development to testing to operations in line with the implementation plan. Management should require that system owner authorization be obtained before a new sys '''Risk Association Control Activities:'''<br> ...
    2 KB (302 words) - 17:57, 3 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (294 words) - 18:25, 5 May 2006
  • '''Risk Association Control Activities:'''<br> * PCI.9.8: Ensure management approves all media that is moved from a secured area (especially when media ...
    2 KB (308 words) - 18:06, 5 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (294 words) - 18:26, 5 May 2006
  • ::'''1. Risk: Incidents or problems affecting financial processes are not identified res ...T management has established procedures across the organization to protect information systems and technology from computer viruses. ...
    2 KB (279 words) - 19:02, 25 June 2006
  • ...itable for the roles for which they are considered, in order to reduce the risk of theft, fraud or misuse of facilities. ...ers should be defined and documented in accordance with the organization's information security policy.<br> ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (302 words) - 18:25, 5 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (309 words) - 18:13, 1 May 2006
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...his systems development life cycle (SDLC) describes the stages involved in information system development projects, from an initial feasibility study through main ...
    3 KB (369 words) - 16:09, 21 June 2006
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...his systems development life cycle (SDLC) describes the stages involved in information system development projects, from an initial feasibility study through main ...
    3 KB (368 words) - 11:58, 22 June 2006
  • ...ntation, and intrusion detection) are used to authorize access and control information flows from and to networks. '''Risk Association Control Activities:'''<br> ...
    6 KB (781 words) - 12:31, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosu :::'''(i)''' information collected or maintained by or on behalf of the agency; and<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...tect the confidentiality, integrity, and availability of the institution’s information assets. All of the controls discussed so far, whether at the perimeters, n ...an be used. Data classification is the identification and organization of information according to its criticality and sensitivity. The classification is linked ...
    9 KB (1,246 words) - 18:20, 10 April 2007
  • ::'''3. Risk: lapses in the continuity of application systems may prevent an organizatio 1.Inquire as to the type of information that is used by management to determine the completeness and timeliness of system and data processing. ...
    2 KB (301 words) - 20:18, 25 June 2006
  • ...igence Directives.''' Protecting Special Access Program Information Within Information Systems policy excerpt: [[Media:JAFAN_6_3.pdf]]<br> :'''Avoid Session Management Pitfalls:''' [[Media:session-management-security.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosu :::'''(i)''' information collected or maintained by or on behalf of the agency; and<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (339 words) - 18:28, 1 May 2006
  • ...ly managed or system functionality is not delivered as required, financial information may not be processed as intended. '''Risk Association Control Activities:''' ...
    5 KB (666 words) - 15:23, 25 June 2006
  • '''(a)''' The Director shall oversee agency information security policies and practices, by—<br> :'''(1)''' promulgating information security standards under section 11331 of title 40;<br> ...
    3 KB (414 words) - 11:45, 4 June 2010
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (332 words) - 18:24, 5 May 2006
  • ==FFIEC Information Technology Examination Handbook Executive Summary== ...ve effort of the FFIEC’s five member agencies, has replaced the 1996 FFIEC Information Systems Examination Handbook (1996 Handbook). ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ==Transaction or Operations Risk== ...risk exists in each product and service offered. The level of transaction risk is affected by the structure of the institution’s processing environment, i ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...hanges to business processes, technology and skills are assessed. Business management, supported by the IT function, should assess the feasibility and alternativ '''Risk Association Control Activities:'''<br> ...
    2 KB (357 words) - 14:15, 3 May 2006
  • == Requirement 12: Maintain a policy that addresses information security. == ...cess that identifies threats, and vulnerabilities, and results in a formal risk assessment.]]<br> ...
    7 KB (988 words) - 19:11, 7 July 2006
  • ...r abnormal activities that may need to be addressed. Access to the logging information is in line with business requirements in terms of access rights and retenti '''Risk Association Control Activities:'''<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...jectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...y Assessment and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']], and provides specific instructions and requirements for assess ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • ...protection and management objectives, and define acceptable use of Company information assets.<br> ...iality, integrity, and availability of Company information assets. Company information assets are defined in the [[Sample Asset Identification and Classification ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...odies, such as an IT strategy committee, to provide strategic direction to management relative to IT, ensuring that the strategy and objectives are cascaded down '''Risk Association Control Activities:'''<br> ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...ents and files include hidden data, firm-wide understanding about metadata management as a real security concern still lags. At best, unintentional disclosure of confidential information can be awkward; at worst, it can raise the specter of malpractice. Potentia ...
    4 KB (587 words) - 22:52, 15 March 2010
  • ...stems or system functionality does not delivered as required and financial information is not processed as intended. ''' 2. Discuss with members of the organization responsible for service level management and test evidence to determine whether service levels are actively managed. ...
    3 KB (342 words) - 15:05, 25 June 2006
  • ...tandard in the field of [[Business continuity planning|Business Continuity Management]] (BCM). This standard replaces PAS 56, a publicly available specification, BS 25999 is a Business Continuity Management (BCM) standard published by the British Standards Institution (BSI). ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...protection and management objectives, and define acceptable use of Company information assets.<br> ...c standards on the identification, classification, and labeling of Company information assets.<br> ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...jectives for establishing specific standards on the assessment and ongoing management of wireless technologies utilized for the extension of network infrastructu ...on Company premises, or who have been granted access to and use of Company Information Assets, are covered by this standard and must comply with associated guidel ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ::'''9. Risk: Insufficient control over authorization, authentication, nonrepudiation, d 2. Inquire whether management has performed an independent assessment of controls within the past year (e ...
    3 KB (360 words) - 17:03, 9 April 2007
  • ...nization’s ability to identify, acquire, install, and maintain appropriate information technology systems.” The process includes the internal development of soft ...o deliver products or services, maintain a competitive position, or manage information.<br> ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • ...particularly authentication credentials and the transmission of sensitive information. It can be used throughout a technological environment, including the oper ...f making data unavailable should anything go wrong with data handling, key management, or the actual encryption. For example, a loss of encryption keys or other ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • ...o or from the system audit process. This section provides templates for an Information Security Program Charter and supporting policies that are required to compl :This section provides templates for an Information Security Program Charter and supporting policies that are required to compl ...
    6 KB (774 words) - 12:41, 25 May 2007
  • '''Risk Association Control Activities:''' ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • '''(a)''' In General.— The Director shall oversee agency information security policies and practices, including—<br> ...g the implementation of policies, principles, standards, and guidelines on information security, including through ensuring timely agency adoption of and complian ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ==Information Technology Management Reform Act of 1996== ...nt Reform Act of 1996 - Title LI (sic): Responsibility for Acquisitions of Information Technology.'''<br> ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • Among the areas top management analyzes are:<br> ...tioned customer KPIs are developed and improved with customer relationship management.<br> ...
    5 KB (786 words) - 16:48, 22 March 2007
  • =='''Sample Life Cycle Management Standard'''== ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...bjective of this category is to ensure the correct and secure operation of information processing facilities.<br> ==Communications and Operations Management== ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...mation technology (IT) systems and their performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiat ...and accountability framework to encourage desirable behavior in the use of information technology."''<br> ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...d sites supporting the Company, or who have been granted access to Company information or systems, are covered by this policy and must comply with associated stan ...through systems owned or administered by or on the behalf of the Company. Information Assets include all personal, private, or financial data about employees, cl ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • ...4:|'''Requirement 4: Encrypt transmission of cardholder data and sensitive information across public networks.''']] '''Maintain a Vulnerability Management Program''' ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • #[[Getting it Right in Records Management | Getting it Right in Records Management]] ...rds management survey - call for sustainable ... | 2009 electronic records management survey - call for sustainable ...]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...res that all user organizations and their auditors have access to the same information and in many cases this will satisfy the user auditor's requirements.<br> ...ol oriented professionals who have experience in accounting, auditing, and information security. A SSAE 16 engagement allows a service organization to have its co ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...ed into development and production processes and procedures to ensure that information assets are consistently available to conduct business and support business ## System and network failures should be reported immediately to the Information Technology Director or designated IT operations manager. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for the de ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...most comprehensive, most beneficial, most accessible, and freely available information security guidance framework on the planet.<br> ...zation no matter what the size, shape, or form they come in. By protecting information, you protect identities, profits, reputations, and the list goes on and on. ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source sof ...ed return on investment, but also significant risk of noncompliance (legal risk).<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...anized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by the exercise of vul ...am for a commercial enterprise, the processes of calculating the cost of a risk exposure and what the appropriate costs of mitigating those risks should be ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for follow ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...c standards on the assessment and ongoing monitoring of threats to Company information assets.<br> ...on Company premises, or who have been granted access to and use of Company Information Assets, are covered by this standard and must comply with associated guidel ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • ...risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actuarial assessments ...of the risk, and accepting some or all of the consequences of a particular risk. ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • Links to helpful or interesting information security documents.<br> ...e is comprised of lawyers, government policy and management professionals, information technology and security professionals, notaries from various legal systems, ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...it function. Tier II questions correspond to the Uniform Rating System for Information Technology (URSIT) rating areas and can be used to determine where the exam :1. Review past reports for outstanding issues, previous problems, or high-risk areas with insufficient coverage related to IT. Consider: ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...structure (major machinery or computing/network resource). As such, [[risk management]] must be incorporated as part of BCP. ...for implementing, operating and improving a documented business continuity management system (BCMS). ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • The board of directors and senior management are responsible for ensuring that the institution’s system of internal cont ...hould assign responsibility for the internal audit function to a member of management (hereafter referred to as the “internal audit manager”) who has sufficient ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...jectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...Guidelines''' builds on the objectives established in the '''Vulnerability Management Standard''', and provides specific instructions and requirements for assess ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • ...m [[Information_Security_Audit | audit]] activities, such as control and [[risk assessment]]s, on a more frequent basis. Technology plays a key role in con ...mation can be evaluated at any given point of time, it also means that the information is able to be verified constantly for errors, fraud, and inefficiencies. It ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...l institutions – such as credit reporting agencies – that receive customer information from other financial institutions. ...npublic information or not, there must be a policy in place to protect the information from foreseeable threats in security and data integrity ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or third parties have inappropriate acce ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...nvestment practices. Generally speaking, these rules mean that the greater risk to which the bank is exposed, the greater the amount of capital the bank ne # Ensuring that Capital requirement is more risk sensitive; ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ==Risk Management== ...ng some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disas ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ==Information Security Audit== ...dit. However, information security encompasses much more than IT. Auditing information security covers topics from auditing the physical security of data centers ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...technology (IT), services, business processes generally, and human capital management. The CMM has been used extensively worldwide in government, commerce, indus ...capability maturity. Humphrey based this framework on the earlier Quality Management Maturity Grid developed by Philip B. Crosby in his book "Quality Is Free". ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]]s that are intended to support businesses in achieving both qu ...s (hence the term ''Library''), each of which covers a core area within IT Management. The names ''ITIL'' and ''IT Infrastructure Library'' are Registered Trade ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...individual keys for [[Encryption | encryption]] may raise significant key management issues. ...line business running. Unauthorized modification of even a single piece of information within a database can lead to reputation damage, litigation, or the collaps ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ’Personal Data’ means any information concerning an identified or identifiable individual. Unless otherwise noted ...such as racial or ethnic origin, present or future health status, genetic information, religious, philosophical or moral beliefs, union affiliation, political vi ...
    18 KB (2,869 words) - 17:46, 29 August 2014
  • * Authentication and password management * Intrusion detection and security risk assessment ...
    18 KB (2,920 words) - 17:59, 18 May 2007
View (previous 250 | ) (20 | 50 | 100 | 250 | 500)