Search results

Jump to navigation Jump to search
View ( | next 250) (20 | 50 | 100 | 250 | 500)
  • ...t considers changes in the competitive environment, economies of scale for information systems staffing and investments, and improved interoperability of platform '''Risk Association Control Activities:'''<br> ...
    2 KB (351 words) - 17:03, 21 June 2006
  • '''PO 5.4 Cost Management'''<br> Implement a cost management process comparing actual costs to budgets. Costs should be monitored and re ...
    2 KB (303 words) - 18:29, 1 May 2006
  • '''DS 5.4 User Account Management'''<br> ...rmation are contractually arranged for all types of users. Perform regular management review of all accounts and related privileges.<br> ...
    6 KB (846 words) - 13:52, 4 May 2006
  • ...ools for operating, accessing and using the systems and services. Relevant information to consider is naming, version numbers and licensing details. A baseline of '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...
    4 KB (506 words) - 18:44, 25 June 2006
  • ...nge standards that require a post-implementation review of the operational information system to assess and report on whether the change met customer requirements '''Risk Association Control Activities:'''<br> ...
    3 KB (394 words) - 11:59, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: In-House and or Package applications may not meet all business and applica ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ==Security requirements of information systems== ...egory is to ensure that security is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...capacity forecasting of IT resources at regular intervals to minimize the risk of service disruptions due to insufficient capacity or performance degradat '''Risk Association Control Activities:'''<br> ...
    3 KB (490 words) - 13:42, 4 May 2006
  • ...deviations from expected performance should be identified, and appropriate management action should be initiated and reported.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (332 words) - 12:39, 4 May 2006
  • '''PO 10.1 Program Management Framework'''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (345 words) - 01:18, 2 May 2006
  • ...izing tasks, error tolerance mechanisms and resource allocation practices. Management should ensure that contingency plans properly address availability, capacit '''Risk Association Control Activities:'''<br> ...
    2 KB (284 words) - 14:37, 21 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...
    3 KB (460 words) - 16:08, 21 June 2006
  • '''DS 5.8 Cryptographic Key Management '''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (413 words) - 19:02, 4 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (333 words) - 16:42, 5 May 2006
  • ==PO 1.1 IT Value Management== ...including financial worth, the risk of not delivering a capability and the risk of not realizing the expected benefits.<br> ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ...urable and predictable by users to encourage proper use of resources. User management should be able to verify actual usage and charging of services. '''Risk Association Control Activities:'''<br> ...
    2 KB (305 words) - 14:51, 5 May 2006
  • ...es and procedures (e.g., hiring, positive work environment and orienting). Management implements processes to ensure that the organization has an appropriately d '''Risk Association Control Activities:'''<br> ...
    2 KB (312 words) - 18:19, 3 May 2006
  • ...to create, implement, and maintain a best practice, risk management-based information security program.<br> ...to create, implement, and maintain a best practice, risk management-based Information Security Program.<br> ...
    5 KB (705 words) - 11:39, 30 May 2015
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'' ...
    2 KB (321 words) - 15:35, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or inadequately tested. Systems produce ...
    4 KB (530 words) - 11:58, 23 June 2006
  • ::'''1. Risk: Up-to-date backups of programs and data may not be available when needed.' Determine if the management of third-party services has been assigned to appropriate individuals.<br> ...
    3 KB (335 words) - 14:05, 26 February 2007
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (296 words) - 17:59, 3 May 2006
  • The objective of this category is to manage information security within the organization's overall administrative structure.<br> ===Management commitment to information security=== ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ...systems and processes used for those purposes. While focused dominantly on information in digital form, the full range of IA encompasses not only digital but also Information assurance as a field has grown from the practice of [[information security]] which in turn grew out of practices and procedures of [[computer ...
    7 KB (983 words) - 10:41, 15 April 2012
  • '''PO 2.1 Enterprise Information Architecture Model'''<br> ...bed in PO1. The model facilitates the optimal creation, use and sharing of information by the business and in a way that maintains integrity and is flexible, func ...
    2 KB (311 words) - 14:12, 1 May 2006
  • [[PO1.1:| 1.1 IT Value Management]]<br> [[PO1.6:| 1.6 IT Portfolio Management]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...consider include validation against contractual terms, the organization’s information architecture, existing applications, interoperability with existing applica '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...
    4 KB (501 words) - 18:24, 25 June 2006
  • '''ME 4.4 Resource Management'''<br> ...current and future strategic objectives and keep up with business demands. Management should put clear, consistent and enforced human resources policies and proc ...
    2 KB (329 words) - 13:34, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Controls provide reasonable assurance that policies and procedures that de ...
    3 KB (432 words) - 12:23, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    5 KB (674 words) - 18:14, 21 June 2006
  • '''PO 6.3 IT Policies Management'''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (421 words) - 18:02, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Conflicting access credential may violate confidentiality, privacy, or pos ...
    3 KB (382 words) - 18:02, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Security and business continuity risks are introduced by technical designs ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...ication]] and [[accreditation]] (C&A) of a DoD IS that will maintain the [[information assurance]] (IA) posture throughout the [[Systems Development Life Cycle|sy ...DoDI 8500.2) as the primary set of security requirements for all automated information systems (AISs). The IA Controls are determined based on the system's [[mis ...
    2 KB (322 words) - 10:16, 15 April 2012
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Development and maintenance of system with potential impact to financial r ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...ces the possibility for a single individual to subvert a critical process. Management also makes sure that personnel are performing only authorized duties releva ==Risk Association Control Activities:== ...
    4 KB (591 words) - 19:45, 14 June 2007
  • ...iew, basis for payment, warranties, arbitration procedures, human resource management and compliance with the organization’s policies.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (319 words) - 17:09, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: The transfer of programs into the live environment is not appropriately co ...
    2 KB (346 words) - 20:00, 23 June 2006
  • ...nce framework including leadership, processes, roles and responsibilities, information requirements, and organizational structures to ensure that the enterprise’s '''Risk Association Control Activities:'''<br> ...
    3 KB (397 words) - 13:28, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...
    6 KB (804 words) - 12:14, 23 June 2006
  • Assess the performance of the existing plans and information systems in terms of contribution to business objectives, functionality, sta '''Risk Association Control Activities:'''<br> ...
    4 KB (586 words) - 01:37, 1 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    4 KB (544 words) - 17:11, 5 May 2006
  • '''DS 11.1 Business Requirements for Data Management '''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (244 words) - 17:51, 5 May 2006
  • ...d conditions of employment should stress the employee’s responsibility for information security, internal control and regulatory compliance. The level of supervis '''Risk Association Control Activities:'''<br> ...
    2 KB (329 words) - 19:26, 1 May 2006
  • ...aced the former process, known as '''DITSCAP''' ('''Department of Defense Information Technology Security Certification and Accreditation Process'''), in 2006. ...at will maintain the [[Information Assurance]] (IA) posture of the Defense Information Infrastructure (DII) throughout the [[Systems Development Life Cycle|system ...
    2 KB (229 words) - 10:14, 15 April 2012
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Design and implementation of new applications may not be appropriately con ...
    3 KB (424 words) - 17:01, 21 June 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    3 KB (377 words) - 18:52, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or inadequately tested. Systems produce ...
    3 KB (365 words) - 19:02, 17 April 2007
  • ...ate security patches and virus control) across the organization to protect information systems and technology from malware (viruses, worms, spy-ware, spam, intern '''Risk Association Control Activities:'''<br> ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ...sider include impact analysis, cost/benefit justification and requirements management.<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (425 words) - 13:19, 23 June 2006
  • '''Federal Information Security Management Act (FISMA)''' ...the implementation of and compliance with the Federal Information Security Management Act including: ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ::'''1. Risk: Without an adequate infrastructure, there is an increased risk that financial reporting applications will not be able to pass data between ...es in the business. When policies and procedures are changed, determine if management approves such changes. Select a sample of projects and determine that user ...
    3 KB (364 words) - 17:41, 21 June 2006
  • ...ess. Risk assessment is [[measurement|measuring]] two quantities of the [[risk]] ''R'', the magnitude of the potential loss ''L'', and the probability ''p :[[image:risk.jpg|thumb|400px|Risk]] ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (258 words) - 14:48, 5 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (263 words) - 12:37, 4 May 2006
  • '''DS 11.3 Media Library Management System '''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (401 words) - 11:50, 28 March 2008
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    3 KB (363 words) - 16:53, 9 April 2007
  • '''DS 5.3 Identity Management'''<br> ...iness needs and job requirements. User access rights are requested by user management, approved by system owner and implemented by the security-responsible perso ...
    6 KB (870 words) - 18:08, 21 June 2006
  • '''PO 5.5 Benefit Management'''<br> ...ibution, appropriate actions should be defined and taken. Where changes in Information Technologies contribution impact the program, or where changes to other rel ...
    3 KB (475 words) - 13:09, 23 June 2006
  • Ensure that quality management focuses on customers by determining their requirements and aligning them to '''Risk Association Control Activities:'''<br> ...
    2 KB (273 words) - 20:01, 1 May 2006
  • ...s granted to some users increases the risk of accidental damage or loss of information and systems.<br> '''Risk exposures from internal users include:''' ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • =='''Vulnerability Management Standard'''== ...jectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • ...demands. Enforce a disciplined approach to portfolio, program and project management, insisting that the business takes ownership of all IT-enabled investments '''Risk Association Control Activities:'''<br> ...
    3 KB (393 words) - 14:35, 21 June 2006
  • '''EVALUATION OF CONTROLS IN INFORMATION SYSTEMS (IS) QUESTIONNAIRE'''<br> ...estion. This can generally be achieved if the company involves an internal information systems auditor in the question answering process. Specific “Guidance Point ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (291 words) - 13:41, 6 March 2007
  • ...ssful resumption of the IT function after a disaster, determine whether IT management has established procedures for assessing the adequacy of the plan and updat '''Risk Association Control Activities:'''<br> ...
    2 KB (299 words) - 19:17, 22 June 2006
  • ..., so all stakeholders can take timely responsibility for the production of management, user and operational procedures, as a result of the introduction or upgrad '''Risk Association Control Activities:'''<br> ...
    2 KB (286 words) - 16:55, 3 May 2006
  • ...outsource the majority of their data processing, core processing, or other information technology systems or services are still expected to implement an appropria ...critical activities by the end of the business day could present systemic risk. The agencies believe that many, if not most, of the 15-20 major banks and ...
    5 KB (705 words) - 13:42, 30 May 2007
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...chnology - Security techniques - Code of practice for information security management''. ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (279 words) - 14:17, 3 May 2006
  • * Review, negotiation and establishment of management responses.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (284 words) - 12:41, 4 May 2006
  • Prepare a quality management plan that describes the project quality system and how it will be implement '''Risk Association Control Activities:'''<br> ...
    2 KB (295 words) - 01:42, 2 May 2006
  • '''AI 5.2 Supplier Contract Management'''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (287 words) - 17:04, 3 May 2006
  • Set up formal change management procedures to handle in a standardized manner all requests (including maint ...ay provide invalid information, which could result in unreliable financial information and reports.<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...development to testing to operations in line with the implementation plan. Management should require that system owner authorization be obtained before a new sys '''Risk Association Control Activities:'''<br> ...
    2 KB (302 words) - 17:57, 3 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (294 words) - 18:25, 5 May 2006
  • '''Risk Association Control Activities:'''<br> * PCI.9.8: Ensure management approves all media that is moved from a secured area (especially when media ...
    2 KB (308 words) - 18:06, 5 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (294 words) - 18:26, 5 May 2006
  • ::'''1. Risk: Incidents or problems affecting financial processes are not identified res ...T management has established procedures across the organization to protect information systems and technology from computer viruses. ...
    2 KB (279 words) - 19:02, 25 June 2006
  • ...itable for the roles for which they are considered, in order to reduce the risk of theft, fraud or misuse of facilities. ...ers should be defined and documented in accordance with the organization's information security policy.<br> ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (302 words) - 18:25, 5 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (309 words) - 18:13, 1 May 2006
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...his systems development life cycle (SDLC) describes the stages involved in information system development projects, from an initial feasibility study through main ...
    3 KB (369 words) - 16:09, 21 June 2006
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...his systems development life cycle (SDLC) describes the stages involved in information system development projects, from an initial feasibility study through main ...
    3 KB (368 words) - 11:58, 22 June 2006
  • ...ntation, and intrusion detection) are used to authorize access and control information flows from and to networks. '''Risk Association Control Activities:'''<br> ...
    6 KB (781 words) - 12:31, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosu :::'''(i)''' information collected or maintained by or on behalf of the agency; and<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...tect the confidentiality, integrity, and availability of the institution’s information assets. All of the controls discussed so far, whether at the perimeters, n ...an be used. Data classification is the identification and organization of information according to its criticality and sensitivity. The classification is linked ...
    9 KB (1,246 words) - 18:20, 10 April 2007
  • ::'''3. Risk: lapses in the continuity of application systems may prevent an organizatio 1.Inquire as to the type of information that is used by management to determine the completeness and timeliness of system and data processing. ...
    2 KB (301 words) - 20:18, 25 June 2006
  • ...igence Directives.''' Protecting Special Access Program Information Within Information Systems policy excerpt: [[Media:JAFAN_6_3.pdf]]<br> :'''Avoid Session Management Pitfalls:''' [[Media:session-management-security.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosu :::'''(i)''' information collected or maintained by or on behalf of the agency; and<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (339 words) - 18:28, 1 May 2006
  • ...ly managed or system functionality is not delivered as required, financial information may not be processed as intended. '''Risk Association Control Activities:''' ...
    5 KB (666 words) - 15:23, 25 June 2006
  • '''(a)''' The Director shall oversee agency information security policies and practices, by—<br> :'''(1)''' promulgating information security standards under section 11331 of title 40;<br> ...
    3 KB (414 words) - 11:45, 4 June 2010
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (332 words) - 18:24, 5 May 2006
  • ==FFIEC Information Technology Examination Handbook Executive Summary== ...ve effort of the FFIEC’s five member agencies, has replaced the 1996 FFIEC Information Systems Examination Handbook (1996 Handbook). ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ==Transaction or Operations Risk== ...risk exists in each product and service offered. The level of transaction risk is affected by the structure of the institution’s processing environment, i ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...hanges to business processes, technology and skills are assessed. Business management, supported by the IT function, should assess the feasibility and alternativ '''Risk Association Control Activities:'''<br> ...
    2 KB (357 words) - 14:15, 3 May 2006
  • == Requirement 12: Maintain a policy that addresses information security. == ...cess that identifies threats, and vulnerabilities, and results in a formal risk assessment.]]<br> ...
    7 KB (988 words) - 19:11, 7 July 2006
  • ...r abnormal activities that may need to be addressed. Access to the logging information is in line with business requirements in terms of access rights and retenti '''Risk Association Control Activities:'''<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...jectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...y Assessment and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']], and provides specific instructions and requirements for assess ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • ...protection and management objectives, and define acceptable use of Company information assets.<br> ...iality, integrity, and availability of Company information assets. Company information assets are defined in the [[Sample Asset Identification and Classification ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...odies, such as an IT strategy committee, to provide strategic direction to management relative to IT, ensuring that the strategy and objectives are cascaded down '''Risk Association Control Activities:'''<br> ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...ents and files include hidden data, firm-wide understanding about metadata management as a real security concern still lags. At best, unintentional disclosure of confidential information can be awkward; at worst, it can raise the specter of malpractice. Potentia ...
    4 KB (587 words) - 22:52, 15 March 2010
  • ...stems or system functionality does not delivered as required and financial information is not processed as intended. ''' 2. Discuss with members of the organization responsible for service level management and test evidence to determine whether service levels are actively managed. ...
    3 KB (342 words) - 15:05, 25 June 2006
  • ...tandard in the field of [[Business continuity planning|Business Continuity Management]] (BCM). This standard replaces PAS 56, a publicly available specification, BS 25999 is a Business Continuity Management (BCM) standard published by the British Standards Institution (BSI). ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...protection and management objectives, and define acceptable use of Company information assets.<br> ...c standards on the identification, classification, and labeling of Company information assets.<br> ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ==Risk Association Control Activities:== Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...jectives for establishing specific standards on the assessment and ongoing management of wireless technologies utilized for the extension of network infrastructu ...on Company premises, or who have been granted access to and use of Company Information Assets, are covered by this standard and must comply with associated guidel ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ::'''9. Risk: Insufficient control over authorization, authentication, nonrepudiation, d 2. Inquire whether management has performed an independent assessment of controls within the past year (e ...
    3 KB (360 words) - 17:03, 9 April 2007
  • ...nization’s ability to identify, acquire, install, and maintain appropriate information technology systems.” The process includes the internal development of soft ...o deliver products or services, maintain a competitive position, or manage information.<br> ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • ...particularly authentication credentials and the transmission of sensitive information. It can be used throughout a technological environment, including the oper ...f making data unavailable should anything go wrong with data handling, key management, or the actual encryption. For example, a loss of encryption keys or other ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • ...o or from the system audit process. This section provides templates for an Information Security Program Charter and supporting policies that are required to compl :This section provides templates for an Information Security Program Charter and supporting policies that are required to compl ...
    6 KB (774 words) - 12:41, 25 May 2007
  • '''Risk Association Control Activities:''' ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • '''(a)''' In General.— The Director shall oversee agency information security policies and practices, including—<br> ...g the implementation of policies, principles, standards, and guidelines on information security, including through ensuring timely agency adoption of and complian ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ==Information Technology Management Reform Act of 1996== ...nt Reform Act of 1996 - Title LI (sic): Responsibility for Acquisitions of Information Technology.'''<br> ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • Among the areas top management analyzes are:<br> ...tioned customer KPIs are developed and improved with customer relationship management.<br> ...
    5 KB (786 words) - 16:48, 22 March 2007
  • =='''Sample Life Cycle Management Standard'''== ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...bjective of this category is to ensure the correct and secure operation of information processing facilities.<br> ==Communications and Operations Management== ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...mation technology (IT) systems and their performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiat ...and accountability framework to encourage desirable behavior in the use of information technology."''<br> ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...d sites supporting the Company, or who have been granted access to Company information or systems, are covered by this policy and must comply with associated stan ...through systems owned or administered by or on the behalf of the Company. Information Assets include all personal, private, or financial data about employees, cl ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • ...4:|'''Requirement 4: Encrypt transmission of cardholder data and sensitive information across public networks.''']] '''Maintain a Vulnerability Management Program''' ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • #[[Getting it Right in Records Management | Getting it Right in Records Management]] ...rds management survey - call for sustainable ... | 2009 electronic records management survey - call for sustainable ...]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...res that all user organizations and their auditors have access to the same information and in many cases this will satisfy the user auditor's requirements.<br> ...ol oriented professionals who have experience in accounting, auditing, and information security. A SSAE 16 engagement allows a service organization to have its co ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...ed into development and production processes and procedures to ensure that information assets are consistently available to conduct business and support business ## System and network failures should be reported immediately to the Information Technology Director or designated IT operations manager. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for the de ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...most comprehensive, most beneficial, most accessible, and freely available information security guidance framework on the planet.<br> ...zation no matter what the size, shape, or form they come in. By protecting information, you protect identities, profits, reputations, and the list goes on and on. ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source sof ...ed return on investment, but also significant risk of noncompliance (legal risk).<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...anized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by the exercise of vul ...am for a commercial enterprise, the processes of calculating the cost of a risk exposure and what the appropriate costs of mitigating those risks should be ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for follow ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...c standards on the assessment and ongoing monitoring of threats to Company information assets.<br> ...on Company premises, or who have been granted access to and use of Company Information Assets, are covered by this standard and must comply with associated guidel ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • ...risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actuarial assessments ...of the risk, and accepting some or all of the consequences of a particular risk. ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • Links to helpful or interesting information security documents.<br> ...e is comprised of lawyers, government policy and management professionals, information technology and security professionals, notaries from various legal systems, ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...it function. Tier II questions correspond to the Uniform Rating System for Information Technology (URSIT) rating areas and can be used to determine where the exam :1. Review past reports for outstanding issues, previous problems, or high-risk areas with insufficient coverage related to IT. Consider: ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...structure (major machinery or computing/network resource). As such, [[risk management]] must be incorporated as part of BCP. ...for implementing, operating and improving a documented business continuity management system (BCMS). ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • The board of directors and senior management are responsible for ensuring that the institution’s system of internal cont ...hould assign responsibility for the internal audit function to a member of management (hereafter referred to as the “internal audit manager”) who has sufficient ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...jectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...Guidelines''' builds on the objectives established in the '''Vulnerability Management Standard''', and provides specific instructions and requirements for assess ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • ...m [[Information_Security_Audit | audit]] activities, such as control and [[risk assessment]]s, on a more frequent basis. Technology plays a key role in con ...mation can be evaluated at any given point of time, it also means that the information is able to be verified constantly for errors, fraud, and inefficiencies. It ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...l institutions – such as credit reporting agencies – that receive customer information from other financial institutions. ...npublic information or not, there must be a policy in place to protect the information from foreseeable threats in security and data integrity ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or third parties have inappropriate acce ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...nvestment practices. Generally speaking, these rules mean that the greater risk to which the bank is exposed, the greater the amount of capital the bank ne # Ensuring that Capital requirement is more risk sensitive; ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ==Risk Management== ...ng some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disas ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ==Information Security Audit== ...dit. However, information security encompasses much more than IT. Auditing information security covers topics from auditing the physical security of data centers ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...technology (IT), services, business processes generally, and human capital management. The CMM has been used extensively worldwide in government, commerce, indus ...capability maturity. Humphrey based this framework on the earlier Quality Management Maturity Grid developed by Philip B. Crosby in his book "Quality Is Free". ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]]s that are intended to support businesses in achieving both qu ...s (hence the term ''Library''), each of which covers a core area within IT Management. The names ''ITIL'' and ''IT Infrastructure Library'' are Registered Trade ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...individual keys for [[Encryption | encryption]] may raise significant key management issues. ...line business running. Unauthorized modification of even a single piece of information within a database can lead to reputation damage, litigation, or the collaps ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ’Personal Data’ means any information concerning an identified or identifiable individual. Unless otherwise noted ...such as racial or ethnic origin, present or future health status, genetic information, religious, philosophical or moral beliefs, union affiliation, political vi ...
    18 KB (2,869 words) - 17:46, 29 August 2014
  • * Authentication and password management * Intrusion detection and security risk assessment ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...[National Institute of Standards and Technology]] (NIST) as U.S. [[Federal Information Processing Standard|FIPS]] PUB 197 (FIPS 197) on November 26 2001 after a 5 ...ne 2003, the US Government announced that AES may be used for [[classified information]]: ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...system by creating standards for the use and dissemination of health care information.<br> ...health care clearinghouses, such as billing services and community health information systems, and health care providers that transmit health care data in a way ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...e disabled, changed, or otherwise properly configured to prevent access to information classified as Proprietary or Confidential.<br> Security administrators SHOULD consider issues related to privilege management for all types of users. For example, in a database with many usernames, it ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...mechanism includes numerous controls to safeguard and limits access to key information system assets at all layers in the network stack. This section addresses l ...um required for work to be performed exposes the institution’s systems and information to a loss of confidentiality, integrity, and availability. Accordingly, th ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...islation set new or enhanced standards for all U.S. public company boards, management and public accounting firms. It does not apply to privately held companies. ...relationship, conceivably placing a significant consulting arrangement at risk, damaging the auditing firm's bottom line. ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ==Information Technology Auditor's Glossary== A service that gathers information from many websites, presents that information to the customer in a consolidated format, and, in some cases, may allow the ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...enable it to perform a specific task, such as the storage and retrieval of information. The program is produced by one or more human authors, but in its final “mo ...ogy in particular makes it easy to transmit and make perfect copies of any information existing in digital form, including copyright-protected works. The second f ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...tion 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the adv (A) information contained in a financial record of a financial institution, or of a card is ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...as a network design principle. The idea is that a maximally useful public information network aspires to treat all content, sites, and platforms equally." ...he ''Wall Street Journal'' said that YouTube, MySpace and blogs are put at risk by net neutrality. Swanson says that YouTube streams as much data in three ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...h Amendment generally prohibits law enforcement from accessing and viewing information stored in a computer if it would be prohibited from opening a closed contai ...all within an exception to the warrant requirement, before it accesses the information stored inside. ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...nd flash drives, and the times the computer was in use. Collectively, this information can reveal to an investigator not just what a computer happens to contain a ...provide (if known) the user's name, street address, and other identifying information. In some cases, investigators confirm that the person named by the ISP actu ...
    138 KB (21,660 words) - 13:18, 5 August 2011
View ( | next 250) (20 | 50 | 100 | 250 | 500)