Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)
  • ...from those budgeted and amount of specialization of the software planned. Risks that affect revenues can be unanticipated competition, privacy, intellectua ...arch and development expenditures can lead both business and technological risks since specialization does not lead to lower unit costs of software (Rao & K ...
    1 KB (215 words) - 18:32, 13 April 2007
  • ...selves to insurance carriers. Coverage is increasingly available to cover risks from security breaches or denial of service attacks. Several insurance com :* Availability, cost, and covered risks vary by insurance company. ...
    3 KB (469 words) - 13:30, 10 April 2007
  • ...ior management on the appetite for IT risk and approval of any residual IT risks.<br> ...
    3 KB (370 words) - 18:04, 1 May 2006
  • ...ling the areas or events that have the potential to cause unwanted change. Risks faced by the project management process and the project deliverable should ....17:|'''SOX.1.17''']] Controls provide reasonable reassurance that project risks are managed.<br> ...
    3 KB (403 words) - 12:37, 23 June 2006
  • ...technology involves more than containing costs and controlling operational risks. An institution capable of aligning its IT infrastructure to support its bu ...information. Changes in technology may not only introduce new operational risks to manage, but can also introduce an institution to increased risk to its r ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ...t should be aimed at maximizing success of value delivery while minimizing risks to information assets through preventive measures, timely identification of ...
    2 KB (331 words) - 18:47, 1 May 2006
  • ...arranged, responsibilities reassigned and access rights removed such that risks are minimized and continuity of the function is guaranteed.<br> ::'''1. Risk: Terminated entities create unacceptable control risks to the Company.'''<br> ...
    3 KB (366 words) - 16:39, 26 June 2006
  • ...as part of the organization’s process for the development of requirements. Risks include threats to data integrity, security, availability, [[Privacy | priv ...
    2 KB (269 words) - 23:52, 14 June 2007
  • This section provides a series of presentations that cover emerging security risks and topics of interest. Your organization can use and tailor these presenta ...resentation on executive management awareness covers security and business risks, anatomy of an attack, and a security risk discussion exercise.<br> ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...agement should identify, measure, control, and monitor technology to avoid risks that threaten the safety and soundness of an institution.<br> The risk identification and management process for technology-related risks is not complete without consideration of the overall IT environment in whic ...
    4 KB (528 words) - 16:58, 28 March 2010
  • ...nes the risks the client faces in going to trial, and compares them to the risks if a guilty plea or a plea of no contest is entered. Counsel may even prese ...
    3 KB (603 words) - 17:57, 22 February 2009
  • ...entation risks and addressed all the necessary components to address these risks, e.g., if the completeness and accuracy of system interfaces were essential ...
    3 KB (475 words) - 13:09, 23 June 2006
  • ...[[SOX.2.0.14:|'''SOX.2.0.14''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in t ...
    2 KB (294 words) - 18:21, 14 June 2006
  • :::a. [[SOX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in t ...
    2 KB (291 words) - 16:02, 25 June 2006
  • ...ment process, and may also be the most difficult and prone to error. Once risks have been identified and assessed, the steps to properly deal with them are .../benefit analysis; individual risks are of more use for evaluating whether risks to individuals are "acceptable". ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'''<br> ...
    2 KB (295 words) - 15:40, 25 June 2006
  • ...or FTP as alternatives, resulting in higher costs and/or greater security risks. ...
    961 bytes (140 words) - 22:16, 15 March 2010
  • ===Identification of risks related to external parties=== Risks to the organization's information and information processing facilities fro ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ===Risks of Metadata=== ...
    4 KB (587 words) - 22:52, 15 March 2010
  • ...that empowers the Program to manage Information Security-related business risks.<br> ...
    2 KB (202 words) - 12:40, 15 June 2007
  • ...luences operational risks (also referred to as transactional risks). These risks include the possibility of loss resulting from inadequate processes, person ...ls and discusses various development, acquisition, and maintenance project risks. Action summaries highlight the primary considerations within each section. ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • :* SP-3; Joint Interagency Issuance on End-User Computing Risks, January 1988 :* SP-8; Interagency Document on EDP Risks in Mergers & Acquisitions, September 1991 ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...vernment-wide management and oversight of the related information security risks, including coordination of information security efforts throughout the civi ...
    1 KB (192 words) - 10:33, 1 June 2010
  • ...vernment-wide management and oversight of the related information security risks, including coordination of information security efforts throughout the civi ...
    1 KB (192 words) - 10:36, 1 June 2010
  • ...nsider the costs and benefits and select responses that constrain residual risks within the defined risk tolerance levels.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • Assess on a recurrent basis the likelihood and impact of all identified risks, using qualitative and quantitative methods. The likelihood and impact asso ...
    2 KB (304 words) - 20:21, 1 May 2006
  • ...ported, enforced management policy maximizes the rewards and minimizes the risks of the open-source software model.<br> ...open source or not) will yield unacceptable levels of technical and legal risks for enterprises. Incorporate the following aspects in your open-source poli ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'''<br> ...
    2 KB (321 words) - 15:35, 25 June 2006
  • * Report security events, potential events, or other risks to the organization and its assets<br> ...n(s)/sensitivity(ies) of the information to be accessed, and the perceived risks<br> ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • ..., ensuring that the business and IT regularly assess and report IT-related risks and the impact on the business. Make sure IT management follows up on risk ...
    2 KB (334 words) - 13:36, 4 May 2006
  • ...tion. Seek approval for recommended actions and acceptance of any residual risks, and ensure that committed actions are owned by the affected process owner( ...
    2 KB (325 words) - 01:16, 2 May 2006
  • ==E-Banking Risks== Transaction or Operations risks arises from fraud, processing errors, system disruptions, or other unantici ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...ects technology standards and practices based on their business relevance, risks and compliance with external requirements.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...risk assessment, the goal of the assessment and the criteria against which risks are evaluated.<br> ...
    2 KB (317 words) - 20:10, 1 May 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...ves have been achieved, deliverables obtained, performance targets met and risks mitigated. Upon review, any deviations from expected performance should be ...
    2 KB (332 words) - 12:39, 4 May 2006
  • ...ves have been achieved, deliverables obtained, performance targets met and risks mitigated. Integrate reporting with similar output from other business func ...
    2 KB (347 words) - 13:38, 4 May 2006
  • ::Do not use scare tactics; give an even-handed presentation of risks. ...
    2 KB (315 words) - 18:46, 25 September 2006
  • ...ountants created two trust services, WebTrust and SysTrust, to address the risks and opportunities of information technology. WebTrust reports provide assur ...e effectiveness of the security process in continually mitigating changing risks. Additionally, the SAS 70 report may not address whether the TSP is meeting ...
    6 KB (829 words) - 19:14, 17 April 2007
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...opment, test, and operational facilities should be separated to reduce the risks of unauthorized access or changes to the operational system.<br> ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ...plication security and availability requirements in response to identified risks, in line with data classification, the organization’s information security ...
    3 KB (374 words) - 15:05, 3 May 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (394 words) - 17:12, 22 March 2007
  • ...mplemented to enable the use of protection profiles and otherwise mitigate risks to data. If protection profiles are not used, the policies should accompl ...ts. Additionally, the devices may be lost or stolen. Mitigation of those risks typically involves encryption of sensitive data, host-provided access contr ...
    9 KB (1,246 words) - 18:20, 10 April 2007
  • ::'''(C)''' implementing policies and procedures to cost-effectively reduce risks to an acceptable level; and<br> ::'''(B)''' cost-effectively reduce information security risks to an acceptable level;<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...curity staff should receive ongoing security training that covers emerging risks to sensitive Company information assets and the latest security trends. ...
    2 KB (275 words) - 17:10, 23 January 2014
  • DIACAP also uses weighted metrics to describe risks and their mitigation. ...
    2 KB (229 words) - 10:14, 15 April 2012
  • Identify and mitigate risks relating to suppliers’ ability to continue effective service delivery in a :::a. [[SOX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in t ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ::'''(C)''' implementing policies and procedures to cost-effectively reduce risks to an acceptable level; and<br> ::'''(B)''' cost-effectively reduce information security risks to an acceptable level;<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • ...ute to the enterprise’s strategic objectives (goals) and related costs and risks. It includes how IT will support IT-enabled investment programs and operati ...
    3 KB (424 words) - 17:01, 21 June 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (436 words) - 14:30, 4 May 2006
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)