Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)
  • ==Sources of standards for Information Security== ...n Security Management System]]s" are of particular interest to information security professionals.<br> ...
    2 KB (287 words) - 14:29, 8 March 2007
  • ...security practices for such systems. It requires the creation of computer security plans, and the appropriate training of system users or owners where the sys It has been superseded by the [[FISMA | Federal Information Security Management Act of 2002]] ...
    1 KB (168 words) - 11:37, 23 May 2010
  • '''BS 7799''' was a standard originally published by British Standards Institution (BSI) in 1995. It was written by the United Kingdom Government' ...n revised in June 2005 and finally incorporated in the ISO 27000 series of standards as [[ISO/IEC 27002]] in July 2007. ...
    2 KB (249 words) - 10:56, 27 October 2012
  • ...led '''blackers''', because they convert RED signals to BLACK. [[TEMPEST]] standards spelled out in NSTISSAM TEMPEST 2-95 specify shielding or a minimum physica *[[Security engineering]] ...
    1 KB (170 words) - 16:06, 14 June 2007
  • ...controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> :*'''[[Security Policy:|'''Security Policy''']]<br> ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • :'''Avoid Session Management Pitfalls:''' [[Media:session-management-security.pdf]]<br> ...Configuration Management for Security:''' [[Media:configuration-management-security.pdf]] <br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ==Physical and Environmental Security== '''Physical security''' describes measures that prevent or deter attackers from accessing a faci ...
    4 KB (592 words) - 19:28, 14 June 2007
  • ...mation technology - Security techniques - Code of practice for information security management''. The current standard is a revision of the version published i ...ining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C-I-A tria ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...yer's Guide to the Emerging Legal Issues 14 ( Joseph F. Ruh, Jr., ed., The Computer Law Association 1996). ...
    1 KB (144 words) - 12:26, 16 October 2014
  • ==Personnel Security== ...loyees, contractors, or third-party employees can exploit their legitimate computer access for malicious, fraudulent, or economic reasons. Additionally, the de ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ...mation technology - Security techniques - Code of practice for information security management''. ...erwise unchanged) in 2007 to align with the other [[ISO/IEC 27000-series]] standards. ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...n of an interference with the owner's right to exclusive possession of the computer. ...here the statutory requirement that the defendant knowingly gain access to computer material is not supported by the factual allegations of the indictment and ...
    5 KB (763 words) - 12:30, 18 February 2009
  • ...ecurity]] which in turn grew out of practices and procedures of [[computer security]]. ...ter science. Therefore, IA is best thought of as a superset of information security. ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...d by the organization to specific standards and is not alterable by mobile computer users.'''<br> :* Examine associated endpoint firewall and security software configurations to verify that administration is restricted only au ...
    2 KB (267 words) - 10:51, 16 June 2010
  • '''PO 8.3 Development and Acquisition Standards'''<br> ...e standards; interoperability; system performance efficiency; scalability; standards for development and testing; validation against requirements; test plans; a ...
    6 KB (863 words) - 13:12, 23 June 2006
  • What are assets? Asset Management from a corporate governance and information security perspective is not just about 'IT' Assets. It is about the management, cont ...is taken from and attributable to UK-National Health Services Information Security it I believe adequately covers what we can do/do with data. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...tackers are unlikely to find them. The technique stands in contrast with [[security by design]], although many real-world projects include elements of both str ...aphy was disturbing to the US government, which seems to have been using a security through obscurity analysis to support its opposition to such work. ...
    11 KB (1,798 words) - 14:44, 14 June 2007
  • ...athways into key systems. Firewalls are a key protection mechanism for any computer network.<br> :'''[[PCI-1.1:|PCI-1.1 Establish firewall configuration standards that include:]]'''<br> ...
    5 KB (702 words) - 12:20, 16 June 2010
  • ...he Secretary of Commerce of standards and guidelines pertaining to Federal computer systems; (5) designate executive agents for information technology acquisit ...ive such standards when compliance would adversely affect the mission of a computer operator or cause a major adverse financial impact on such operator which i ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • '''DS 5.10 Network Security '''<br> ...at security techniques and related management procedures (e.g., firewalls, security appliances, network segmentation, and intrusion detection) are used to auth ...
    6 KB (781 words) - 12:31, 23 June 2006
  • ...ding program development, program change, access to programs and data, and computer operations, which are periodically reviewed, updated and approved by manage ...ity risks are introduced by technical designs incompatible with enterprise standards.''' ...
    3 KB (471 words) - 12:32, 23 June 2006
  • ...elecommunications equipment within an operations center will have a higher security zone than I/O operations, with the media used by that equipment stored at y ...en>'''HORSE FACTS:'''</font> Financial institutions should define physical security zones and implement appropriate preventative and detective controls in each ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...le Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...rs shall abide by and comply with any and all copyright laws pertaining to computer software and by any software license agreements that are legally applicable ...
    7 KB (953 words) - 14:13, 1 May 2010
  • ...ed in accordance with design specifications, development and documentation standards and quality requirements. Approve and sign off on each key stage of the app ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produc ...
    6 KB (804 words) - 12:14, 23 June 2006
  • ...force the security controls we need to comply with the companies corporate security policy.<br> * Authorization and user security administration ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...rting on Controls at a Service Organization, was finalized by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA) in ...professionals who have experience in accounting, auditing, and information security. A SSAE 16 engagement allows a service organization to have its control pol ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...Encryption Standard]] (DES). AES was announced by [[National Institute of Standards and Technology]] (NIST) as U.S. [[Federal Information Processing Standard|F ...oftware and hardware, is relatively easy to implement, and requires little computer memory. As a new encryption standard, it is currently being deployed on a l ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ...h only peripherally addressed BCP to improve an organization's information security procedures. BS 25999's applicability extends to all organizations. In 2007, * Hacker (computer security)|Cyber attack ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...electronic documents or business data from one computer system to another computer system, i.e. from one trading partner to another trading partner without hu ...with appropriate EDI messages. It also refers specifically to a family of standards. ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ...ations where the terminology is similar. For example, from the information security point of view, "digital signature" means the result of applying to specific ...These Guidelines use "digital signature" only as it is used in information security terminology, as meaning the result of applying the technical processes desc ...
    22 KB (3,420 words) - 15:18, 3 April 2007
  • ...e members of the European Union are required to adhere to certain “minimum standards” in processing “personal data.” Personal data is defined as “any informatio (1) EU Standards for Processing Personal Data. ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • '''Can you mitigate database security risks?'''<br> ...ng data for order fulfillment, employee identification data such as social security numbers, and storing customer data such as shipping addresses and credit ca ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...veryday life; examples include security of automated teller machine cards, computer passwords, and electronic commerce all depend on cryptography. ...ccessive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and m ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • ...each booklet as warranted by changes in technology or by the evolution of standards related to financial institution IT practices. Additional booklets will be :* Information Security ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ::* Regulatory, audit, and security reports from key service providers ...rts, resolution of audit findings, format and contents of work papers, and security over audit materials.<br> ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • Users' Security Handbook The Users' Security Handbook is the companion to the Site Security ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • ...PATRIOT Act, the Homeland Security Act and other laws focused on national security, Congress has been active in changing the legal landscape for access to rea ===Computer Fraud and Abuse Act=== ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...nd security requirements and payment card industry ([[PCI:|PCI]]) security standards put a further onus on companies to stay abreast of ever-changing and increa ==Privacy and Security Trade-offs== ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ...a law enforcement problem, but poses a serious national and international security threat as well. ...proceedings. Since 1970, there have been many legislative and regulatory standards imposed to help prevent money laundering and to strengthen the government’s ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • ...PATRIOT Act, the Homeland Security Act and other laws focused on national security, Congress has been active in changing the legal landscape for access to rea ...ing, National Security and the “Adverse Inference” Problem, 22 SANTA CLARA COMPUTER & HIGH TECH. L.J. 757, 764-766 (2006); Susan Freiwald, Uncertain Privacy: C ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...in one nation may be decidedly illegal in another. In fact, even different standards concerning the burden of proof in a civil case can cause jurisdictional pro ...n to companies such as electronic marketing, online privacy, registration, security, transfer, and breach notification, with analysis provided by [http://www.l ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...ive Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national identifiers for provid ...ation provisions also address the security and privacy of health data. The standards are meant to improve the efficiency and effectiveness of the nation's healt ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ===Title III: Computer Maintenance Competition Assurance Act=== ...computers could make certain temporary, limited copies while working on a computer. ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...hether the risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actuarial asses Certain aspects of many of the risk management standards have come under criticism for having no measurable improvement on risk even ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...viduals and network access issues. A subsequent section addresses physical security controls. ...he minimum required for work to be performed. The financial institution’s security policy should address access rights to system resources and how those right ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • Pre-established standards or requirements a product or project must meet. ...a monitoring tool. This information includes opening balances, funds and security transfers, accounting activity, and DI cap and collateral limits. ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...urt, including hearsay and the foundation to establish the authenticity of computer records. Many courts have categorically determined that computer records are admissible under Federal Rule of Evidence 803(6), the hearsay e ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...use. The rapid growth of credit card use on the Internet has made database security lapses particularly costly; in some cases, millions of accounts have been c ...make unauthorized purchases on a card until it is canceled. Without other security measures, a thief could potentially purchase thousands of dollars in mercha ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...nformation, important documents, and even documents necessary for homeland security. If the hacker were to gain this information, it would mean identity theft ...lly fabricated. The most common technique involves combining a real social security number with a name and birth date other than the ones associated with the n ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...ent concepts did not originate within the original UK Government's Central Computer and Telecommunications Agency (CCTA) project to develop ITIL. IBM claims th ...il the mid 1990s. This wider adoption and awareness has led to a number of standards, including [[ISO 20000|ISO/IEC 20000]] which is an international standard c ...
    37 KB (5,348 words) - 10:12, 8 September 2011
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)