Search results

Jump to navigation Jump to search
View ( | next 50) (20 | 50 | 100 | 250 | 500)
  • [[Category:Evaluation]] ...
    2 KB (401 words) - 20:33, 28 July 2009
  • ...n criteria for IT security products can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...e needed in the relevant position, and are suitable for use in performance evaluation. Role descriptions should contain the responsibility for internal control.< ...
    3 KB (427 words) - 17:58, 1 May 2006
  • ...the interview, counsel should develop as many leads for investigation and evaluation of the case as possible. Therefore, questions about the relationship of the ...
    3 KB (498 words) - 13:29, 22 February 2009
  • [[DS7.3:| 7.3 Evaluation of Training Received]]<br> ...
    4 KB (538 words) - 19:08, 14 June 2007
  • # Specified officials for audit or evaluation purposes; ...
    3 KB (470 words) - 19:08, 19 April 2010
  • * Periodic testing and evaluation of the effectiveness of information security policies, procedures, practice ...ut will be incorporated into Phase II and use existing IT product testing, evaluation, and validation programs.<br> ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • :'''(5)''' periodic testing and evaluation of the effectiveness of information security policies, procedures, and prac ::'''(B)''' may include testing relied on in a [1] evaluation under section 3535;<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • :'''(5)''' periodic testing and evaluation of the effectiveness of information security policies, procedures, and prac ::'''(B)''' may include testing relied on in a [1] evaluation under section 3545;<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • | The Auditor's Study and Evaluation of Internal Control | The Effects of EDP on the Auditor's Study and Evaluation of Internal Control ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • :*'''Configuration Control:'''The evaluation, coordination, and approval of all changes to the equipment configuration d ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ...gned and monitored. Establish fair, transparent, repeatable and comparable evaluation of business cases including financial worth, the risk of not delivering a c ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ## SIRT incident response capabilities shall be exercised, for evaluation purposes, at least annually. However, the SIRT members (with the possible e ...
    5 KB (737 words) - 15:24, 21 January 2014
  • [[PO7.7:| 7.7 Employee Job Performance Evaluation]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...ormal procedures for the deposit and recording of change requests, for the evaluation of costs and impacts, and finally for the acceptation, modification, or rej ...ld be checked by a [[software audit]]. This activity covers an independent evaluation of the conformance of the configuration item under study. Audits are conduc ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ...of the Air Force study was a model for the military to use as an objective evaluation of software subcontractors' process capability maturity. Humphrey based thi ...assessed using a process maturity questionnaire and a Software Capability Evaluation method devised by Humphrey and his colleagues at the Software Engineering I ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • * A formal plan for testing and acceptance, including independent evaluation where appropriate ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • [[Category:Evaluation]] ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • :'''B. Change Review and Evaluation'''<br> ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ===Review and evaluation of the plan=== ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...technologists who understand that this methodology works for business risk evaluation is helpful as you build your business acumen; a valuable commodity if you a ...guard the mission of their organization; and the commitment to the ongoing evaluation and assessment of the IT-related business risks.<br> ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...orsewiki/ HORSE Project] (HORSE) - Holistic Operational Readiness Security Evaluation is a comprehensive information security framework designed to be accessible ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...collect and disseminate information about consumers to be used for credit evaluation and certain other purposes, including employment. Credit bureaus, a type of ...
    12 KB (1,814 words) - 12:01, 19 July 2012
  • ...ance of continuous auditing has its own pulse. The time frame selected for evaluation depends largely on the frequency of updates within the accounting informati ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ===Review and Evaluation of the Plan=== ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...l auditors typically review IT control procedures as part of their overall evaluation of internal controls when providing an opinion on the adequacy of an instit ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • :2. Analyze the internal auditor’s evaluation of IT controls and compare it with any evaluations done by examiners.<br> ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...Technical Support provides a number of specialist functions: Research and Evaluation, Market Intelligence (particularly for Design and Planning and Capacity Man ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...clusions about the effectiveness of their internal controls based on their evaluation as of that date.” ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...ad mostly out-side directors, who had no management ties, undertook formal evaluation of its directors, and was responsive to investors' requests for information ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...ntify and define the service offering itself, plus the supported products, evaluation criteria, and quality of service customers should expect. SLAs are typicall ...
    74 KB (11,078 words) - 13:08, 9 April 2007
View ( | next 50) (20 | 50 | 100 | 250 | 500)