Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • ==Web Application Auditing== ...k the application under test. You already have the most important tool for auditing web applications: a browser. If you use Firefox, you will be able to use a ...
    14 KB (2,387 words) - 13:41, 4 April 2007
  • '''Continuous Auditing''' or '''Proactive Auditing''' is an automatic method used to perform [[Information_Security_Audit | au The "continuous" aspect of continuous auditing and reporting refers to the real-time or near real-time capability for fina ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ==Sample Auditing Standard== ...on Policy:|'''Sample Asset Protection Standard''']], and provides specific auditing and logging requirements including activation, protection, retention, and s ...
    3 KB (444 words) - 20:12, 15 January 2014

Page text matches

  • ==Sample Auditing Standard== ...on Policy:|'''Sample Asset Protection Standard''']], and provides specific auditing and logging requirements including activation, protection, retention, and s ...
    3 KB (444 words) - 20:12, 15 January 2014
  • ...im's system is audited in the same way as a manual system, and whether the auditing system detected any computer crimes prior to the instant case. ...
    948 bytes (155 words) - 20:39, 22 February 2009
  • :Links to freely available security tools that are useful for auditing and securing applications, networks, and systems. Care should be taken when ...
    978 bytes (124 words) - 00:00, 26 March 2007
  • ===Set login auditing level=== * Set login auditing level to failure or all. ...
    7 KB (1,018 words) - 13:53, 14 May 2007
  • ...16, Reporting on Controls at a Service Organization, was finalized by the Auditing Standards Board of the American Institute of Certified Public Accountants ( ...itor's Report with an unqualified opinion that is issued by an Independent Auditing Firm differentiates the service organization from its peers by demonstratin ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...tions and requirements for auditing information assets are provided in the Auditing Standard.<br> ...
    5 KB (673 words) - 18:16, 14 January 2014
  • '''Continuous Auditing''' or '''Proactive Auditing''' is an automatic method used to perform [[Information_Security_Audit | au The "continuous" aspect of continuous auditing and reporting refers to the real-time or near real-time capability for fina ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...formation assets are provided in the [[Sample Auditing Standard:|'''Sample Auditing Standard''']].<br> ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...of standardized reports, such as trust services reports or a Statement of Auditing Standards 70 (SAS 70) report. ...eport on internal controls, including security, using SAS 70. SAS 70 is an auditing standard developed by the American Institute of Certified Public Accountant ...
    6 KB (829 words) - 19:14, 17 April 2007
  • :a. SOX.4.2.1.9: The UNIX operating system application has forensic auditing enabled to enable the monitoring of administrative access related events.<b ...
    3 KB (422 words) - 00:09, 13 June 2006
  • ...abases and highlights key components to look for and different methods for auditing these areas.<br> ..., and how they work. In particular, the following areas are key points in auditing logical security:<br> ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...and processed in accordance with the [[Sample Auditing Standard:|'''Sample Auditing Standard''']].<br> ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • :'''[[Auditing Firewalls: A Practical Guide]]'''<br> :Offers advice on the how and why of auditing firewalls, including a discussion of policy, design, audit, and tools.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...:|'''SOX.4.2.4.9''']] The OS/400 operating system application has forensic auditing enabled to enable the monitoring of administrative access related events.<b ...
    6 KB (821 words) - 18:11, 28 August 2006
  • ...ose covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of these systems should be reported to the appr ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ....9:|'''SOX.4.2.1.9''']] The UNIX operating system application has forensic auditing enabled to enable the monitoring of administrative access related events.<b ...
    7 KB (895 words) - 13:44, 23 June 2006
  • ...ose covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of these systems should be reported to the appr ...
    4 KB (507 words) - 14:58, 21 January 2014
  • :* Periodic auditing of host configurations, both manual and automated. ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ...cess Systems, in accordance with the [[Sample Auditing Standard:|'''Sample Auditing Standard''']], must log the date and time for all failed and successful use ...cess Systems, in accordance with the [[Sample Auditing Standard:|'''Sample Auditing Standard''']], must limit the number of failed remote access attempts to th ...
    14 KB (1,956 words) - 14:16, 1 May 2010
  • ...he whole life cycle of a configuration. By actively defining, tracing, and auditing configuration items, failures can be detected early, and corrective action === Software Configuration Auditing & Validation === ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ==Web Application Auditing== ...k the application under test. You already have the most important tool for auditing web applications: a browser. If you use Firefox, you will be able to use a ...
    14 KB (2,387 words) - 13:41, 4 April 2007
  • ## All systems, in accordance with the Auditing Standard, must log the date and time for all failed and successful user att ## All systems, in accordance with the Auditing Standard, must limit the number of failed log-on attempts to three (3) befo ...
    8 KB (1,182 words) - 19:41, 15 January 2014
  • ...(1)''' shall be performed in accordance with generally accepted government auditing standards; and<br> ...
    4 KB (634 words) - 13:00, 4 June 2010
  • ...of the audit committee and management to carefully consider the extent of auditing that will effectively monitor the internal control system subject to consid :* Directly auditing the technology service provider’s operations and controls ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • Oracle auditing SHOULD be set to log audit data to the operating system file system. Loggin Oracle Event Auditing: Obtain output from the SELECT * FROM audit_actions<br> ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • #### Auditing ...
    5 KB (681 words) - 21:56, 15 January 2014
  • * ISO/IEC 27007 - a guideline for auditing information security management systems (in preparation) ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...e maintained online for thirty (30) days and retained in accordance to the Auditing Activation Standard and applicable laws and regulations. ...
    5 KB (765 words) - 20:00, 15 January 2014
  • ...lications; standard computing environments; archival systems; and periodic auditing and compliance checking.<br> ...
    9 KB (1,213 words) - 13:20, 9 March 2009
  • ...k space. The logs must be used for auditing, as MySQL does not provide any auditing features. Logs must be kept as per information security accountability stan ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...ernance. This should, ideally, be corrected by the working of the external auditing process. ...rm of the Sarbanes-Oxley Act prohibit accounting firms from providing both auditing and management consulting services. Similar provisions are in place under c ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...], regulatory and standards [[Regulatory compliance|compliance]], [[audits|auditing]], [[Business continuity planning|business continuity]], and [[disaster rec ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...Investor Protection Act' (in the United States Senate) and 'Corporate and Auditing Accountability and Responsibility Act' (in the United States House of Repre ...audit partner rotation, and auditor reporting requirements. It restricts auditing companies from providing non-audit services (e.g., consulting) for the same ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • :* Logging the auditing of key management-related activities; and ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • ...g but not limited to attempts to deactivate, modify, or delete signatures, auditing features, configuration files, and/or audit logs.<br> ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • - Obtain virus checking software or security auditing tools. Learn networks. If available, virus detection or system auditing software ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • ...ernance. This should, ideally, be corrected by the working of the external auditing process. ...on situation as noted below) prohibit accounting firms from providing both auditing and management consulting services. Similar provisions are in place under c ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...s-Oxley Act]] was written to stress the importance of business control and auditing. Sarbanes-Oxley and Basel-II in Europe have been catalysts for the developm ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • * wellenreiter : 802.11b discovery and auditing ...
    8 KB (1,058 words) - 12:30, 5 August 2011
  • ...st assessment tool available, allows for the more progressive [[continuous auditing]] methodology. * [[Continuous_auditing | Proactive Auditing or Constant Auditing concepts]] ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • :::D. System auditing and monitoring efforts shall be conducted in accordance with the [[Sample T ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • * [[Auditing information security]] ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • :* Logging and auditing the use of privileged access :* Regular auditing of a firewall’s configuration and testing of the firewall’s effectiveness ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...Recovery_Requirements_Analysis | Disaster recovery and business continuity auditing]] ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • There will be significant variance in your testing and auditing opportunities due in part to whether or not the system is already in produc ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...her the institution has appropriate standards and processes for risk-based auditing and internal risk assessments that: ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...ed in the American Institute of Certified Public Accountants’ Statement of Auditing Standards Number 70. ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...War on Terrorism. Executive Directors are now required to provide ongoing auditing of disbursements made from their institutions to ensure that no funds are p ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...onitor [each] user's Internet access as deemed appropriate," and that such auditing would be implemented "to support identification, termination, and prosecuti ...
    154 KB (23,956 words) - 13:16, 5 August 2011
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)