Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...t considers changes in the competitive environment, economies of scale for information systems staffing and investments, and improved interoperability of platform '''Risk Association Control Activities:'''<br> ...
    2 KB (351 words) - 17:03, 21 June 2006
  • '''PO 5.4 Cost Management'''<br> Implement a cost management process comparing actual costs to budgets. Costs should be monitored and re ...
    2 KB (303 words) - 18:29, 1 May 2006
  • '''DS 5.4 User Account Management'''<br> ...rmation are contractually arranged for all types of users. Perform regular management review of all accounts and related privileges.<br> ...
    6 KB (846 words) - 13:52, 4 May 2006
  • ...ools for operating, accessing and using the systems and services. Relevant information to consider is naming, version numbers and licensing details. A baseline of '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...
    4 KB (506 words) - 18:44, 25 June 2006
  • ...nge standards that require a post-implementation review of the operational information system to assess and report on whether the change met customer requirements '''Risk Association Control Activities:'''<br> ...
    3 KB (394 words) - 11:59, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: In-House and or Package applications may not meet all business and applica ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ==Security requirements of information systems== ...egory is to ensure that security is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...capacity forecasting of IT resources at regular intervals to minimize the risk of service disruptions due to insufficient capacity or performance degradat '''Risk Association Control Activities:'''<br> ...
    3 KB (490 words) - 13:42, 4 May 2006
  • ...deviations from expected performance should be identified, and appropriate management action should be initiated and reported.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (332 words) - 12:39, 4 May 2006
  • '''PO 10.1 Program Management Framework'''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (345 words) - 01:18, 2 May 2006
  • ...izing tasks, error tolerance mechanisms and resource allocation practices. Management should ensure that contingency plans properly address availability, capacit '''Risk Association Control Activities:'''<br> ...
    2 KB (284 words) - 14:37, 21 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...
    3 KB (460 words) - 16:08, 21 June 2006
  • '''DS 5.8 Cryptographic Key Management '''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (413 words) - 19:02, 4 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (333 words) - 16:42, 5 May 2006
  • ==PO 1.1 IT Value Management== ...including financial worth, the risk of not delivering a capability and the risk of not realizing the expected benefits.<br> ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ...urable and predictable by users to encourage proper use of resources. User management should be able to verify actual usage and charging of services. '''Risk Association Control Activities:'''<br> ...
    2 KB (305 words) - 14:51, 5 May 2006
  • ...es and procedures (e.g., hiring, positive work environment and orienting). Management implements processes to ensure that the organization has an appropriately d '''Risk Association Control Activities:'''<br> ...
    2 KB (312 words) - 18:19, 3 May 2006
  • ...to create, implement, and maintain a best practice, risk management-based information security program.<br> ...to create, implement, and maintain a best practice, risk management-based Information Security Program.<br> ...
    5 KB (705 words) - 11:39, 30 May 2015
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'' ...
    2 KB (321 words) - 15:35, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or inadequately tested. Systems produce ...
    4 KB (530 words) - 11:58, 23 June 2006
  • ::'''1. Risk: Up-to-date backups of programs and data may not be available when needed.' Determine if the management of third-party services has been assigned to appropriate individuals.<br> ...
    3 KB (335 words) - 14:05, 26 February 2007
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (296 words) - 17:59, 3 May 2006
  • The objective of this category is to manage information security within the organization's overall administrative structure.<br> ===Management commitment to information security=== ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ...systems and processes used for those purposes. While focused dominantly on information in digital form, the full range of IA encompasses not only digital but also Information assurance as a field has grown from the practice of [[information security]] which in turn grew out of practices and procedures of [[computer ...
    7 KB (983 words) - 10:41, 15 April 2012
  • '''PO 2.1 Enterprise Information Architecture Model'''<br> ...bed in PO1. The model facilitates the optimal creation, use and sharing of information by the business and in a way that maintains integrity and is flexible, func ...
    2 KB (311 words) - 14:12, 1 May 2006
  • [[PO1.1:| 1.1 IT Value Management]]<br> [[PO1.6:| 1.6 IT Portfolio Management]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...consider include validation against contractual terms, the organization’s information architecture, existing applications, interoperability with existing applica '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...
    4 KB (501 words) - 18:24, 25 June 2006
  • '''ME 4.4 Resource Management'''<br> ...current and future strategic objectives and keep up with business demands. Management should put clear, consistent and enforced human resources policies and proc ...
    2 KB (329 words) - 13:34, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Controls provide reasonable assurance that policies and procedures that de ...
    3 KB (432 words) - 12:23, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    5 KB (674 words) - 18:14, 21 June 2006
  • '''PO 6.3 IT Policies Management'''<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (421 words) - 18:02, 23 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Conflicting access credential may violate confidentiality, privacy, or pos ...
    3 KB (382 words) - 18:02, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Security and business continuity risks are introduced by technical designs ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...ication]] and [[accreditation]] (C&A) of a DoD IS that will maintain the [[information assurance]] (IA) posture throughout the [[Systems Development Life Cycle|sy ...DoDI 8500.2) as the primary set of security requirements for all automated information systems (AISs). The IA Controls are determined based on the system's [[mis ...
    2 KB (322 words) - 10:16, 15 April 2012
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Development and maintenance of system with potential impact to financial r ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...ces the possibility for a single individual to subvert a critical process. Management also makes sure that personnel are performing only authorized duties releva ==Risk Association Control Activities:== ...
    4 KB (591 words) - 19:45, 14 June 2007
  • ...iew, basis for payment, warranties, arbitration procedures, human resource management and compliance with the organization’s policies.<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (319 words) - 17:09, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: The transfer of programs into the live environment is not appropriately co ...
    2 KB (346 words) - 20:00, 23 June 2006
  • ...nce framework including leadership, processes, roles and responsibilities, information requirements, and organizational structures to ensure that the enterprise’s '''Risk Association Control Activities:'''<br> ...
    3 KB (397 words) - 13:28, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...
    6 KB (804 words) - 12:14, 23 June 2006
  • Assess the performance of the existing plans and information systems in terms of contribution to business objectives, functionality, sta '''Risk Association Control Activities:'''<br> ...
    4 KB (586 words) - 01:37, 1 May 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    4 KB (544 words) - 17:11, 5 May 2006
  • '''DS 11.1 Business Requirements for Data Management '''<br> '''Risk Association Control Activities:'''<br> ...
    2 KB (244 words) - 17:51, 5 May 2006
  • ...d conditions of employment should stress the employee’s responsibility for information security, internal control and regulatory compliance. The level of supervis '''Risk Association Control Activities:'''<br> ...
    2 KB (329 words) - 19:26, 1 May 2006
  • ...aced the former process, known as '''DITSCAP''' ('''Department of Defense Information Technology Security Certification and Accreditation Process'''), in 2006. ...at will maintain the [[Information Assurance]] (IA) posture of the Defense Information Infrastructure (DII) throughout the [[Systems Development Life Cycle|system ...
    2 KB (229 words) - 10:14, 15 April 2012
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Design and implementation of new applications may not be appropriately con ...
    3 KB (424 words) - 17:01, 21 June 2006
  • '''Risk Association Control Activities:'''<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    3 KB (377 words) - 18:52, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or inadequately tested. Systems produce ...
    3 KB (365 words) - 19:02, 17 April 2007
  • ...ate security patches and virus control) across the organization to protect information systems and technology from malware (viruses, worms, spy-ware, spam, intern '''Risk Association Control Activities:'''<br> ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ...sider include impact analysis, cost/benefit justification and requirements management.<br> '''Risk Association Control Activities:'''<br> ...
    3 KB (425 words) - 13:19, 23 June 2006
View ( | ) (20 | 50 | 100 | 250 | 500)