Search results

Jump to navigation Jump to search
  • ...is also the responsibility of Release Management. This guarantees that all software can be conceptually optimized to meet the demands of the business processes *Plan to rollout of software ...
    2 KB (352 words) - 16:42, 20 March 2007
  • ...are fixed via vendor security patches, and all systems should have current software patches to protect against exploitation by employees, external hackers, and ...re that all system components and software have the latest vendor-supplied security patches.'''<br> ...
    4 KB (578 words) - 18:46, 28 February 2007
  • '''Secure by design''', in software engineering, means that the program in question has been designed from the ...years of testing and debugging, and while they may provide a great deal of security, they typically have no way to guarantee that a new bug or exploit won't be ...
    2 KB (343 words) - 18:39, 14 June 2007
  • ...also create risk that can be in the form of more rework than anticipated, security holes, and privacy invasions (Messerschmitt and Szyperski, 2004).<br> ...the potential customer base, specialization risk can be significant for a software firm. After probabilities of scenarios have been calculated with risk analy ...
    1 KB (215 words) - 18:32, 13 April 2007
  • ...Unix and Linux systems. This may involve, among other measures, applying a software patch to the kernel such as Exec Shield or PaX; closing open TCP and UDP po *[[Computer security]] ...
    1 KB (168 words) - 18:26, 14 June 2007
  • ...ver authorization, authentication, nonrepudiation, data classification and security monitoring may result in inaccurate financial reporting.''' ...security standards has been developed that supports the objectives of the security policy. ...
    3 KB (360 words) - 16:59, 25 June 2006
  • ...'']] IT management implements system software that does not jeopardize the security of the data and programs being stored on the system. ...ermine that a risk assessment of the potential impact of changes to system software is performed. ...
    2 KB (303 words) - 19:58, 23 June 2006
  • ...de a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support Federal operations and ass ...dination of information security efforts throughout the civilian, national security, and law enforcement communities;<br> ...
    1 KB (192 words) - 10:33, 1 June 2010
  • ...de a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support Federal operations and ass ...dination of information security efforts throughout the civilian, national security, and law enforcement communities;<br> ...
    1 KB (192 words) - 10:36, 1 June 2010
  • ::'''2. Risk: Insufficient configuration controls can lead to security and availability exposures that may permit unauthorized access to systems a :::a. [[SOX.2.0.29:|'''SOX.2.0.29''']] Only authorized software is permitted for use by employees using company IT assets.<br> ...
    2 KB (314 words) - 18:27, 25 June 2006
  • ...hich are used to access the organization’s network, have personal firewall software installed and active.'''<br> ...oint firewall and security software configurations to verify that security software standards are acceptable and that updates are current prior to authorizing ...
    2 KB (296 words) - 10:57, 16 June 2010
  • ...lopment processes to confirm they are based on industry standards and that security is included throughout the life cycle.<br> :From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (298 words) - 18:26, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (297 words) - 18:33, 28 February 2007
  • '''10. Risk: Reactive security monitoring results in data compromise and financial loss or liability.'''<b :a. SOX.4.2.1.10: UNIX administration team is notified when security violations occur.<br> ...
    3 KB (421 words) - 20:20, 12 June 2006
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (304 words) - 18:36, 28 February 2007
  • '''Zero day''' in technology refers to software, videos, music, or information unlawfully released or obtained on the day o ===Software=== ...
    4 KB (570 words) - 19:02, 14 June 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (307 words) - 18:29, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (304 words) - 18:28, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (316 words) - 18:30, 28 February 2007
  • '''AI 2.10 Application Software Maintenance'''<br> ...ort issues and upgrades, periodic review against business needs, risks and security requirements.<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...ist of security patches installed on each system to the most recent vendor security patch list, to determine that current vendor patches are installed.<br> ...ch installation to determine they require installation of all relevant new security patches within 30 days.<br> ...
    2 KB (295 words) - 18:20, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (334 words) - 18:37, 28 February 2007
  • == Requirement 11: Regularly test security systems and processes. == ...tems, processes, and custom software should be tested frequently to ensure security is maintained over time and through changes. ...
    3 KB (372 words) - 17:59, 7 July 2006
  • '''DS 5.7 Protection of Security Technology '''<br> ...ow profile. However, do not make security of systems reliant on secrecy of security specifications. ...
    3 KB (377 words) - 18:52, 4 May 2006
  • ::'''1. Risk: Insufficient configuration controls can lead to security and availability exposures that may permit unauthorized access to systems a ...0.32''']] Periodic testing and assessment is performed to confirm that the software and network infrastructure is appropriately configured. ...
    2 KB (288 words) - 18:53, 25 June 2006
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> ...> to gauge and promote end-user awareness of managing risk with the use of security processes.<br> ...
    2 KB (305 words) - 17:31, 3 August 2006
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> ...> to gauge and promote end-user awareness of managing risk with the use of security processes.<br> ...
    2 KB (309 words) - 17:34, 3 August 2006
  • What are assets? Asset Management from a corporate governance and information security perspective is not just about 'IT' Assets. It is about the management, cont ...is taken from and attributable to UK-National Health Services Information Security it I believe adequately covers what we can do/do with data. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...otification message produced by the system being tested to verify that the security administrators are being proactively notified of possible access violations ...be a monitoring background process that sends an electronic message to the security administrative group automatically when root access occurs. The email messa ...
    3 KB (422 words) - 00:09, 13 June 2006
  • '''AI 2.4 Application Security and Availability'''<br> ...ed risks, in line with data classification, the organization’s information security architecture and risk profile. Issues to consider include access rights and ...
    3 KB (374 words) - 15:05, 3 May 2006
  • Controls provide reasonable assurance that IT components, as they relate to security, processing and availability, are well protected, would prevent any unautho :5. Prevent the inclusion of unauthorized software ...
    3 KB (429 words) - 18:55, 25 June 2006
  • ...cilities, technology, and user procedures) and ensure that the information security requirements are met by all components. The test data should be saved for a ISO 17799 12.1 Security requirements of information systems.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • '''AI 2.5 Configuration and Implementation of Acquired Application Software'''<br> Controls provide reasonable assurance that IT components, as they relate to security, processing and availability, are well protected, would prevent any unautho ...
    4 KB (501 words) - 18:24, 25 June 2006
  • ...controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> :*'''[[Security Policy:|'''Security Policy''']]<br> ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...h management and upgrade strategies, risks, vulnerabilities assessment and security requirements.<br> ::'''2. Risk: The impact of application system changes (e.g., hardware and software) should be evaluated and adjusted to ensure ongoing availability, performan ...
    6 KB (819 words) - 13:54, 23 June 2006
  • =='''Sample Software Acceptable Use Standard'''== ...ons and requirements on the proper and appropriate business use of Company software.<br> ...
    7 KB (953 words) - 14:13, 1 May 2010
  • '''PO 4.8 Responsibility for Risk, Security and Compliance'''<br> ...es may need to be assigned at a system-specific level to deal with related security issues. Obtain direction from senior management on the appetite for IT risk ...
    3 KB (370 words) - 18:04, 1 May 2006
  • '''DS 5.9 Malicious Software Prevention, Detection and Correction '''<br> ...m malware (viruses, worms, spy-ware, spam, internally developed fraudulent software, etc.). ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ==Security Audit Guidance== For security audit guidance, please refer to [[Audit_Guidance_Examination_Procedures | A ...
    5 KB (665 words) - 14:40, 11 April 2007
  • ==Security requirements of information systems== The objective of this category is to ensure that security is an integral part of the organization's information systems, and of the b ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ==Personnel Security== ...rs grant legitimate users system access necessary to perform their duties; security personnel enforce access rights in accordance with institution standards. B ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • Controls provide reasonable assurance that IT components, as they relate to security, processing and availability, are well protected, would prevent any unautho ...ion on configuration items. This repository includes hardware, application software, middleware, parameters, documentation, procedures and tools for operating, ...
    4 KB (506 words) - 18:44, 25 June 2006
  • :'''Verify that the personal firewall software is configured by the organization to specific standards and is not alterabl :* Examine associated endpoint firewall and security software configurations to verify that administration is restricted only authorized ...
    2 KB (267 words) - 10:51, 16 June 2010
  • The objective of this category is to manage information security within the organization's overall administrative structure.<br> ===Management commitment to information security=== ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ...ropriate into related groups or domains (e.g., hardware, software, support software). These groups may match the organizational responsibilities or the user an ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...
    4 KB (601 words) - 15:01, 8 August 2006
  • ==Laws and regulations governing Information Security== ...have also been included when they have a significant impact on information security. ...
    4 KB (556 words) - 14:03, 8 March 2007
  • '''DS 11.6 Security Requirements for Data Management '''<br> Establish arrangements to identify and apply security requirements applicable to the receipt, processing, physical storage and ou ...
    5 KB (649 words) - 18:23, 5 May 2006
  • :'''Avoid Session Management Pitfalls:''' [[Media:session-management-security.pdf]]<br> ...Configuration Management for Security:''' [[Media:configuration-management-security.pdf]] <br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ...t Protection Standard, Company protection standards shall include specific security requirements in the following areas: ## Sample Protection Standards must be reviewed by the Information Security Department to ensure vulnerabilities are not introduced into the Company pr ...
    5 KB (681 words) - 21:56, 15 January 2014
  • ...any change-control procedures related to implementing security patches and software modifications, and determine the procedures required.'''<br> ...ct a sample of system components and find the three most recent changes or security patches for each system component, and trace those changes back to related ...
    2 KB (307 words) - 18:42, 28 February 2007
  • ...any change-control procedures related to implementing security patches and software modifications, and determine the procedures required.'''<br> ...ct a sample of system components and find the three most recent changes or security patches for each system component, and trace those changes back to related ...
    2 KB (304 words) - 18:44, 28 February 2007
  • ...any change-control procedures related to implementing security patches and software modifications, and determine the procedures required.'''<br> ...ct a sample of system components and find the three most recent changes or security patches for each system component, and trace those changes back to related ...
    2 KB (307 words) - 18:43, 28 February 2007
  • ...any change-control procedures related to implementing security patches and software modifications, and determine the procedures required.'''<br> ...ct a sample of system components and find the three most recent changes or security patches for each system component, and trace those changes back to related ...
    2 KB (311 words) - 18:42, 28 February 2007
  • '''AI 7.9 Software Release'''<br> Ensure that the release of software is governed by formal procedures ensuring sign-off, packaging, regression t ...
    2 KB (296 words) - 17:59, 3 May 2006
  • ...guration management software is available. When a system needs hardware or software upgrade, a computer technician can access the configuration management prog ...lopment, is called [[Software Configuration Management]] (SCM). Using SCM, software developers can keep track of the source code, documentation, problems, chan ...
    7 KB (942 words) - 15:09, 23 March 2007
  • [[DS5:| '''5 Ensure Systems Security''']]<br> [[DS5.1:| 5.1 Management of IT Security]]<br> ...
    4 KB (538 words) - 19:08, 14 June 2007
  • [[AI2:| '''2 Acquire and Maintain Application Software''']]<br> [[AI2.4:| 2.4 Application Security and Availability]]<br> ...
    3 KB (341 words) - 19:07, 14 June 2007
  • '''AI 5.4 Software Acquisition'''<br> ..., arbitration procedures, upgrade terms, and fitness for purpose including security, escrow and access rights.<br> ...
    3 KB (428 words) - 14:05, 23 June 2006
  • :2. Corporate values (ethical values, control and security culture, etc.) :3. Implementation of new IT infrastructure and software (packages and applications) ...
    2 KB (333 words) - 16:42, 5 May 2006
  • Kutten, Computer Software: Protection, Liability, Law, Forms § 4.051. ...Center for Computer Crime Data (Los Angels 1985); Computer Crime, Computer Security, Computer Ethics (The first annual statistical report), J BloomBecker, ed., ...
    865 bytes (127 words) - 10:50, 25 February 2009
  • ...system software and data. This section provides templates for Information Security standards that are required to comply with ISO Systems Development and Main ...s for life cycle management of information systems, including hardware and software.<br> ...
    5 KB (613 words) - 18:14, 25 July 2006
  • ...approved and licensed anti-virus or virus detection software packages. The software packages are listed in the system of record. ## Company-approved anti-virus software must be installed on all Company servers and client workstations. ...
    5 KB (765 words) - 20:00, 15 January 2014
  • ...configuration, integration and maintenance of hardware and infrastructural software to protect resources and ensure availability and integrity. Responsibilitie ...
    1 KB (146 words) - 17:19, 7 June 2006
  • ...is scheme includes details about data ownership, definition of appropriate security levels and protection controls, and a brief description of data retention a ISO 17799 4.1 Information security infrastructure.<br> ...
    3 KB (363 words) - 16:53, 9 April 2007
  • =='''Sample Third Party Security Awareness Standard'''== ...f the [[Sample Information Security Program Charter:|'''Sample Information Security Program Charter''']] and associated policies and standards.<br> ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • '''AI 2.7 Development of Application Software'''<br> ...legal and contractual aspects are identified and addressed for application software developed by third parties.<br> ...
    6 KB (804 words) - 12:14, 23 June 2006
  • ITIL 7. Supplier Relationship Management Software Asset Management, Organization, Roles and Responsibilities.<br> ITIL 4.1 Decision about centralization Software Asset Management.<br> ...
    3 KB (356 words) - 17:11, 1 May 2006
  • ...ogram changes, system changes and maintenance (including changes to system software) is standardized, logged, approved, documented and subject to formal change ::2.) security, ...
    3 KB (447 words) - 13:36, 23 June 2006
  • ...op and maintain a risk response to ensure that cost-effective controls and security measures mitigate exposure to risks on a continuing basis. The risk respons ISO 17799 12.1 Objective: To ensure that security is an integral part of information systems.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...tackers are unlikely to find them. The technique stands in contrast with [[security by design]], although many real-world projects include elements of both str ...aphy was disturbing to the US government, which seems to have been using a security through obscurity analysis to support its opposition to such work. ...
    11 KB (1,798 words) - 14:44, 14 June 2007
  • =='''Logical Security'''== ...n a computer network or a computer workstation. It is a subset of computer security.<br> ...
    7 KB (1,093 words) - 19:00, 5 March 2007
  • ...ty and availability, and testing. Perform a [[Information_Security_Audit | security audit]] reassessment when significant technical or logical discrepancies oc ...
    2 KB (329 words) - 13:35, 6 March 2007
  • ...uch as the board, executives, business units, individual users, suppliers, security officers, risk managers, the corporate compliance group, outsourcers and of ITIL Software Asset Management.<br> ...
    2 KB (342 words) - 18:20, 1 May 2006
  • ...y milestones based on agreed sign-off criteria. Issues to consider include software coding standards; naming conventions; file formats; schema and data diction ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produc ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ...user activity and security related events which are reviewed daily by the security administrators.<br> ...revalidations of user group membership and user accounts are performed by security administration.<br> ...
    4 KB (550 words) - 14:34, 1 May 2006
  • ...elecommunications equipment within an operations center will have a higher security zone than I/O operations, with the media used by that equipment stored at y ...en>'''HORSE FACTS:'''</font> Financial institutions should define physical security zones and implement appropriate preventative and detective controls in each ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...igurations of the operating system (OS), browsers, and other network-aware software. ...rus, anti-spyware, and anti-rootkit software. An additional technology is software that limits applications calls to the OS to the minimum necessary for the a ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ITIL Security Management<br> ITIL Security Management Measures<br> ...
    4 KB (544 words) - 17:11, 5 May 2006
  • ...ts (NDA), escrow contracts, continued supplier viability, conformance with security requirements, alternative suppliers, penalties and rewards, etc.<br> ...OX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contrac ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...e defined and documented in accordance with the organization's information security policy.<br> * Act in accordance with the organization's information security policy, including execution of processes or activities particular to the in ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • '''DS 5.2 IT Security Plan '''<br> ...ith appropriate investments in services, personnel, software and hardware. Security policies and procedures are communicated to stakeholders and users. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ITIL 6. Organising Roles and Functions Software Asset Management, Organization, Roles and Responsibilities.<br> ISO 17799 4.1 Information security infrastructure.<br> ...
    3 KB (393 words) - 17:18, 1 May 2006
  • # '''Electronic Mail Software''' ## Only Company approved versions and configurations of electronic mail software listed within the Company System of Record documentation may be used. ...
    7 KB (974 words) - 19:34, 16 January 2014
  • ...elopment of software applications or systems and the purchase of hardware, software, or services from third parties.<br> ==Accounting for Software Costs== ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • ...e system audit process. This section provides templates for an Information Security Program Charter and supporting policies that are required to comply with IS ==Compliance with organizational security policies and technical standards== ...
    6 KB (774 words) - 12:41, 25 May 2007
  • ::'''2. Risk: Insufficient configuration controls can lead to security and availability exposures that may permit unauthorized access to systems a :::a. [[SOX.2.0.31:|'''SOX.2.0.31''']] Application software and data storage systems are properly configured to provision access based ...
    2 KB (324 words) - 18:46, 25 June 2006
  • ...ogram changes, system changes and maintenance (including changes to system software) is standardized, logged, approved, documented and subject to formal change * ISO 17799 10.1.2: Operational systems and application software are subject to strict change management control.<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...e key, generally less secure than hardware schemes, but providing adequate security for many types of applications. See generally Schneier, supra note 18, at § ...
    2 KB (244 words) - 12:37, 16 October 2014
  • Links to helpful or interesting information security documents.<br> :This paper discusses common security vulnerabilities in PHP applications.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • :'''(1)''' the term '''information security''' means protecting information and information systems from unauthorized a :'''(2)''' the term '''national security system''' means any information system (including any telecommunications sy ...
    3 KB (368 words) - 00:50, 1 June 2010
  • ...gement involves users in the design of applications, selection of packaged software and the testing thereof, to maintain a reliable environment.<br> ...al part of development in house. During the planning stages of development security, availability, and processing integrity must be considered. ...
    3 KB (354 words) - 13:39, 22 June 2006
  • ...olicies and practices are in place to ensure the integrity of data through security and end user development methodology.<br> ::'''5. Risk: IT security measures are not aligned with business requirements.'''<br> ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...transmitting, or storing data and information, as well as the operation of software products and tools.<br> :'''C. Browser Software''' ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ...uctions and requirements for life cycle management of Company hardware and software are provided in the [[Sample_System_Development_Life_Cycle_Standard:|'''Sys ...g, testing, and enhancing systems to ensure the integration of appropriate security controls. Specific instructions and requirements for systems development ar ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ...modern computers and receive hundreds of megabytes of data, poses another security headache. A spy (perhaps posing as a cleaning person) could easily conceal ...rs that are no longer in use will contain information that is invisible to software but is nonetheless still there on the physical platter. Some government age ...
    4 KB (702 words) - 15:52, 14 June 2007
  • ...nt policy maximizes the rewards and minimizes the risks of the open-source software model.<br> ...d where employees conform to establish open-source solutions as "approved" software assets.<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • '''DS 5.10 Network Security '''<br> ...at security techniques and related management procedures (e.g., firewalls, security appliances, network segmentation, and intrusion detection) are used to auth ...
    6 KB (781 words) - 12:31, 23 June 2006
  • :::*Evaluate security risks and consequences.<br> :::C. Discuss security goals (e.g., confidentiality, integrity, availability.).<br> ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ITIL Software Asset Management.<br> ISO 17799 4.1 Information security infrastructure.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...fe cycle management of Company information systems, including hardware and software.<br> '''Protection standard''' refers to the required system and security configuration for a network device, system, or application.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • Translate business requirements into a high-level design specification for software development, taking into account the organization’s technological direction ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompati ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...e hidden data, firm-wide understanding about metadata management as a real security concern still lags. ...rneys and support staff who prepare documents should be made aware of what software features may embed metadata (e.g., track changes, comments, document proper ...
    4 KB (587 words) - 22:52, 15 March 2010
  • ==Information Security Aspects of Business Continuity Management== ...at different physical locations, using similar but different machines and software which may communicate over different communications lines. Different trade ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ...or the continuation of external party access in the case of an information security incident; ...s for the connection or access and the working arrangement. Generally, all security requirements resulting from work with external parties or internal controls ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ITIL Service Support, Release Management, 9.3.6 Definitive software library.<br> ISO10.5 Security in development and support processes.<br> ...
    3 KB (382 words) - 18:02, 3 May 2006
  • ...g]][[PCI-10.5.5:|PCI-10.5.5 Use file integrity monitoring/change detection software (such a Tripwire) on logs to ...ents at least daily. Log reviews should include those servers that perform security functions like IDS and authentication (AAA) servers (e.g RADIUS).]]<br> ...
    4 KB (530 words) - 17:53, 7 July 2006
  • ...ment 2: Do not use vendor-supplied defaults for system passwords and other security parameters.''']] * [[PCI 5:|'''Requirement 5: Use and regularly update anti-virus software.''']] ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • ==Information Security Audit== ...rom auditing the physical security of data centers to the auditing logical security of databases and highlights key components to look for and different method ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...Security policies, standards, guidelines, and procedures. The Information Security Program will protect information assets by establishing policies to identif ...ide for the development of organizational security standards and effective security management practices.<br> ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...of all services, protocols, and ports allowed, including documentation of security features implemented for those protocols considered to be insecure.]]<br> :'''[[PCI-1.4:|PCI-1.4 Install personal firewall software on any mobile and/or employee-owned computers with direct connectivity to t ...
    5 KB (702 words) - 12:20, 16 June 2010
  • ...migration between environments, version control, test data and tools, and security.<br> ...
    3 KB (432 words) - 13:02, 23 June 2006
  • ...e that the acquisition of IT-related infrastructure, facilities, hardware, software and services satisfies business requirements.<br> ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompati ...
    3 KB (442 words) - 13:59, 23 June 2006
  • ...mpany information stores that include sources such as hardware devices and software applications; standard computing environments; archival systems; and period The '''Chief Information Security Officer''' (CISO) and the Record Hold/Discovery Sub-Committee of the '''<Yo ...
    9 KB (1,213 words) - 13:20, 9 March 2009
  • ...rses you for BYOD expenses in service plans and usage, equipment costs and software expenses, the following actions may result in disciplinary action with your ...ated Company policies are first accepted and subsequent Company supporting security, privacy and risk technology and processes are fully implemented. ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • ...ecurity]] which in turn grew out of practices and procedures of [[computer security]]. ...ter science. Therefore, IA is best thought of as a superset of information security. ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ==Security Management== ...ITIL Security Management is based on the code of practice for information security management also known as ISO/IEC 17799. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ...performed and appropriately approved (including account management and IT security). Obtain and examine documents associated with requirements analysis from t ISO 17799 8.7 Exchanges of information and software.<br> ...
    3 KB (446 words) - 16:36, 1 May 2006
  • ...nvironmental protection and security. Ensure compatibility of hardware and software to restore archived data and periodically test and refresh archived data. * ISO 7.2 Equipment security<br> ...
    5 KB (700 words) - 18:07, 23 June 2006
  • ...security for such documentation, including distribution control (see also "security of system documentation" control)<br> ...acilities; minimize the risk of systems failures; protect the integrity of software and information; maintain the integrity and availability of information pro ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...force the security controls we need to comply with the companies corporate security policy.<br> * Authorization and user security administration ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ::3. Software changes resulting from testing efforts should be made in the development en ::3. Transfer of software from the staging environment to the production environment shall be coordin ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...Leveraging Your Financial Software | A Guide to Leveraging Your Financial Software]] #[[Amazon Web Services Security White Paper | Amazon Web Services Security White Paper]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • * Integrity of computer components and software: Hardware errors may result in the loss or alteration of data in a computer * Security of the computer system: The fact that a person is charged with computer cri ...
    4 KB (684 words) - 20:10, 22 February 2009
  • ...ations where the terminology is similar. For example, from the information security point of view, "digital signature" means the result of applying to specific ...These Guidelines use "digital signature" only as it is used in information security terminology, as meaning the result of applying the technical processes desc ...
    22 KB (3,420 words) - 15:18, 3 April 2007
  • Oracle's security by default is not extremely good. For example, Oracle will allow users to c ...entication MUST use a password security policy to maintain database access security. You MUST implement password constraints for all users that have the abilit ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...les for the responsibility of information, business processes, application software, infrastructure, etc.<br> ...c Operational Readiness Security Evaluation is a comprehensive information security framework designed to be accessible, extensible, comprehensive, and collabo ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...a law enforcement problem, but poses a serious national and international security threat as well. ...inst hostile foreign countries to further U.S. foreign policy and national security objectives. OFAC is also responsible for issuing regulations that restrict ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • '''Incident''' refers to an anomalous event that may indicate a security intrusion. ...ccordance with the SIRT Routine Operations Procedure, to routinely process security incidents and intrusion detected by automated or manual detection methods.< ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • As a career security practitioner and Chief Security Officer to several companies over the years, my significant responsibility ...focused on helping you understanding the core elements of a successful IT security risk management program for a commercial enterprise, the processes of calcu ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...re a Remote User will gain access to a network or system: 1) a hardware or software token which produces a code that will change randomly at short time interva ::4. Remote Users must receive Company-approved technical and security training prior to being granted privileges to remotely access Company infor ...
    14 KB (1,956 words) - 14:16, 1 May 2010
  • ::* Regulatory, audit, and security reports from key service providers ::* Technology service providers and software vendor listings<br> ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...aused by thousands of employees distracted from their work and by time its security department spent trying to halt the distractions after employee refused to ...ting to access any computer, computer system, computer network or computer software, program, documentation, data or property contained in any computer, comput ...
    5 KB (763 words) - 12:30, 18 February 2009
  • :* Information Security :* SP-4; Supervisory Policy On Large Scale Integrated Financial Software Systems (LSIS), November 1988 ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • Users' Security Handbook The Users' Security Handbook is the companion to the Site Security ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • Information assets must be protected from destructive software elements such as viruses and malicious code that impair normal operations. Auditing must be activated to record relevant security events. The audit logs must be securely maintained for a reasonable period ...
    5 KB (673 words) - 18:16, 14 January 2014
  • ...s used in many applications encountered in everyday life; examples include security of automated teller machine cards, computer passwords, and electronic comme ...ccessive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and m ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • ...ltering, destroying, or concealing documents; testimony relied on forensic software tests run by expert, which used searches to identify documents that were de ...
    5 KB (816 words) - 15:41, 22 February 2009
  • :4. '''[[Information Technology Infrastructure Library#Systems Management|Security Management]]''' ...'[[Information Technology Infrastructure Library#Software Asset Management|Software Asset Management]]''' ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...took the premise and integrated the Security Trifecta philosophy of cyber security with Governance, Technology and Vigilance. The process is technically relia ...lying on ratio or trend analysis at higher levels of data aggregation. CDA software can continuously and automatically monitor transactions, comparing their ge ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...utation network]], not a [[Feistel network]]. AES is fast in both computer software and hardware, is relatively easy to implement, and requires little computer ==Security== ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ...y significant information systems are defined as the computer hardware and software, including system programs and application programs, which are used to perf ...n and are not subject to sampling. Other controls, such as programming and security authorization, are conducive to audit trail inspection and are subject to s ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • '''Can you mitigate database security risks?'''<br> ...ng data for order fulfillment, employee identification data such as social security numbers, and storing customer data such as shipping addresses and credit ca ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • *Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of e *Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless tele ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...e paradigm, including the transmission, message flow, document format, and software used to interpret the documents. EDI is considered to describe the rigorous The EDI standards were designed to be independent of communication and software technologies. EDI can be transmitted using any methodology agreed to by the ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ...to IT security risk management and may be found here: Risky Business: [[IT Security Risk Management Demystified]] ...] risk assessments should cover all IT risk management functions including security, outsourcing, and business continuity. Senior management should ensure IT-r ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...use. The rapid growth of credit card use on the Internet has made database security lapses particularly costly; in some cases, millions of accounts have been c ...make unauthorized purchases on a card until it is canceled. Without other security measures, a thief could potentially purchase thousands of dollars in mercha ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...hether the risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actuarial asses ...E (annualized loss expectancy) and compares the expected loss value to the security control implementation costs (cost-benefit analysis). ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...viduals and network access issues. A subsequent section addresses physical security controls. ...he minimum required for work to be performed. The financial institution’s security policy should address access rights to system resources and how those right ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...PATRIOT Act, the Homeland Security Act and other laws focused on national security, Congress has been active in changing the legal landscape for access to rea ...mation without delay.” This provision was further modified by the Homeland Security Act to increase the number of governmental agencies to which service provid ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • The Administration Simplification provisions also address the security and privacy of health data. The standards are meant to improve the efficien ...security-rule/ Health Insurance Portability and Accountability Act (HIPAA) Security Rule]. The audit framework is available for purchase to implement it in you ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...0.14:| '''SOX.2.0.14''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contrac :::f. [[SOX.2.0.16:| '''SOX.2.0.16''']] A regular review of security, availability and processing integrity is performed by third-party service ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...PATRIOT Act, the Homeland Security Act and other laws focused on national security, Congress has been active in changing the legal landscape for access to rea ...4-528 (2005); Anita Ramasastry, Lost In Translation? Data Mining, National Security and the “Adverse Inference” Problem, 22 SANTA CLARA COMPUTER & HIGH TECH. L ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • * [[Computer software]] * [[Use of computer security consultants, EDP auditors, and computer professionals]] ...
    9 KB (1,069 words) - 20:29, 22 February 2009
  • ...a monitoring tool. This information includes opening balances, funds and security transfers, accounting activity, and DI cap and collateral limits. '''Antivirus software''' ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...nformation, important documents, and even documents necessary for homeland security. If the hacker were to gain this information, it would mean identity theft ...lly fabricated. The most common technique involves combining a real social security number with a name and birth date other than the ones associated with the n ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...conduct (see Free Speech), and numerous users of peer-to-peer file-sharing software were subject to civil lawsuits for copyright infringement. This system runs ...n to companies such as electronic marketing, online privacy, registration, security, transfer, and breach notification, with analysis provided by [http://www.l ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...urtherance of the administration of justice, national defense, or national security;<br> ...ion for the negligent design or manufacture of computer hardware, computer software, or firmware.<br> ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • ...urtherance of the administration of justice, national defense, or national security; or ...ion for the negligent design or manufacture of computer hardware, computer software, or firmware. ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...to having their data collected before they are permitted to download Alexa software, and (4) pay up to $40 to each customer whose data was found in Alexa’s dat ...nst RealNetworks alleged that RealNetworks improperly used its RealJukebox software to access personal information stored on plaintiffs’ hard drives in violati ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • ...even types of criminal activity enumerated in the CFAA: obtaining national security information, compromising confidentiality, trespassing in a government comp ...violate the CFAA by releasing the findings of their research regarding the security holes associated with the MBTA fare charging system. The court found that a ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...t changes may be obtained by lawful means, an opportunity essential to the security of the Republic, is a fundamental principle of our constitutional system." ...crutiny, found that the Loudoun County Library’s policy of using filtering software to block sexually explicit Internet sites violated the First Amendment. Whi ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • ...ajor banking crisis caused mostly by credit default swaps, mortgage-backed security markets and similar derivatives. As [[Basel III]] was negotiated, this was ...r different regulators according to geographic location, there are several software applications available. These include capital calculation engines and exte ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...ration reserves the right to monitor use of this network to ensure network security and to respond to specific allegations of employee misuse. Use of this netw ...ten necessary that some computer equipment, peripherals, instructions, and software be seized and examined in the laboratory setting. This is true because of t ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...ecords; the party opposing admission would have to show only that a better security system was feasible."). ...ding creating a forensic image of the agent's computer's hard drive, using software to save the chats, or using a basic "print screen" function. Id. Still, the ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...or the occupant’s permission or knowledge; the expanded use of [[National Security Letters]], which allows the [[Federal Bureau of Investigation]] (FBI) to se .../cgi-bin/bdquery/z?d108:H.R.3171: H.R. 3171], [[THOMAS]]</ref> and the ''[[Security and Freedom Ensured Act]]'' (SAFE),<ref name="SAFE-THOMAS"> ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...(D. Mass. 2002) (upholding warrant for seizure of computer and all related software and storage devices where such an expansive search was "the only practical ...be seized was sufficient as there was "no way to specify what hardware and software had to be seized to retrieve the images accurately"); United States v. Lond ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...description of the goods so that they can be recognized and (c) provide a security to indemnify the importer, the owner of the goods, and the customs authorit *Hahn, Robert W., ''Intellectual Property Rights in Frontier Industries: Software and Biotechnology'', AEI Press, March 2005. ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...dentify gaps in the organization’s principles and processes. This type of software is based on project management style methodologies such as the ABACUS metho ...oint of view came under substantial criticism circa in the wake of various security scandals including mutual fund timing episodes and, in particular, the back ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...th Cir. 2005) (finding that agent's use of "sophisticated" Encase forensic software did not exceed scope of consent to search laptop). ...ystem operator" whose job is to keep the network running smoothly, monitor security, and repair the network when problems arise. System operators have "root le ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...d trace device include both a "device" and a "process," the statute covers software as well as physical devices. Because the definitions are written in broad, ...s characteristic of organized crime; (3) an immediate threat to a national security interest; or (4) an ongoing attack on a protected computer (as defined in 1 ...
    97 KB (14,928 words) - 13:21, 5 August 2011