Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...luences operational risks (also referred to as transactional risks). These risks include the possibility of loss resulting from inadequate processes, person ...ls and discusses various development, acquisition, and maintenance project risks. Action summaries highlight the primary considerations within each section. ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • :* SP-3; Joint Interagency Issuance on End-User Computing Risks, January 1988 :* SP-8; Interagency Document on EDP Risks in Mergers & Acquisitions, September 1991 ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...vernment-wide management and oversight of the related information security risks, including coordination of information security efforts throughout the civi ...
    1 KB (192 words) - 10:33, 1 June 2010
  • ...vernment-wide management and oversight of the related information security risks, including coordination of information security efforts throughout the civi ...
    1 KB (192 words) - 10:36, 1 June 2010
  • ...nsider the costs and benefits and select responses that constrain residual risks within the defined risk tolerance levels.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • Assess on a recurrent basis the likelihood and impact of all identified risks, using qualitative and quantitative methods. The likelihood and impact asso ...
    2 KB (304 words) - 20:21, 1 May 2006
  • ...ported, enforced management policy maximizes the rewards and minimizes the risks of the open-source software model.<br> ...open source or not) will yield unacceptable levels of technical and legal risks for enterprises. Incorporate the following aspects in your open-source poli ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'''<br> ...
    2 KB (321 words) - 15:35, 25 June 2006
  • * Report security events, potential events, or other risks to the organization and its assets<br> ...n(s)/sensitivity(ies) of the information to be accessed, and the perceived risks<br> ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • ..., ensuring that the business and IT regularly assess and report IT-related risks and the impact on the business. Make sure IT management follows up on risk ...
    2 KB (334 words) - 13:36, 4 May 2006
  • ...tion. Seek approval for recommended actions and acceptance of any residual risks, and ensure that committed actions are owned by the affected process owner( ...
    2 KB (325 words) - 01:16, 2 May 2006
  • ==E-Banking Risks== Transaction or Operations risks arises from fraud, processing errors, system disruptions, or other unantici ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...ects technology standards and practices based on their business relevance, risks and compliance with external requirements.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...risk assessment, the goal of the assessment and the criteria against which risks are evaluated.<br> ...
    2 KB (317 words) - 20:10, 1 May 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...ves have been achieved, deliverables obtained, performance targets met and risks mitigated. Upon review, any deviations from expected performance should be ...
    2 KB (332 words) - 12:39, 4 May 2006
  • ...ves have been achieved, deliverables obtained, performance targets met and risks mitigated. Integrate reporting with similar output from other business func ...
    2 KB (347 words) - 13:38, 4 May 2006
  • ::Do not use scare tactics; give an even-handed presentation of risks. ...
    2 KB (315 words) - 18:46, 25 September 2006
  • ...ountants created two trust services, WebTrust and SysTrust, to address the risks and opportunities of information technology. WebTrust reports provide assur ...e effectiveness of the security process in continually mitigating changing risks. Additionally, the SAS 70 report may not address whether the TSP is meeting ...
    6 KB (829 words) - 19:14, 17 April 2007
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...opment, test, and operational facilities should be separated to reduce the risks of unauthorized access or changes to the operational system.<br> ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ...plication security and availability requirements in response to identified risks, in line with data classification, the organization’s information security ...
    3 KB (374 words) - 15:05, 3 May 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (394 words) - 17:12, 22 March 2007
  • ...mplemented to enable the use of protection profiles and otherwise mitigate risks to data. If protection profiles are not used, the policies should accompl ...ts. Additionally, the devices may be lost or stolen. Mitigation of those risks typically involves encryption of sensitive data, host-provided access contr ...
    9 KB (1,246 words) - 18:20, 10 April 2007
  • ::'''(C)''' implementing policies and procedures to cost-effectively reduce risks to an acceptable level; and<br> ::'''(B)''' cost-effectively reduce information security risks to an acceptable level;<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...curity staff should receive ongoing security training that covers emerging risks to sensitive Company information assets and the latest security trends. ...
    2 KB (275 words) - 17:10, 23 January 2014
  • DIACAP also uses weighted metrics to describe risks and their mitigation. ...
    2 KB (229 words) - 10:14, 15 April 2012
  • Identify and mitigate risks relating to suppliers’ ability to continue effective service delivery in a :::a. [[SOX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in t ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ::'''(C)''' implementing policies and procedures to cost-effectively reduce risks to an acceptable level; and<br> ::'''(B)''' cost-effectively reduce information security risks to an acceptable level;<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • ...ute to the enterprise’s strategic objectives (goals) and related costs and risks. It includes how IT will support IT-enabled investment programs and operati ...
    3 KB (424 words) - 17:01, 21 June 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (442 words) - 13:59, 23 June 2006
  • ...formation Security Program to manage Information Security-related business risks.<br> ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...re based on risk assessments, cost-effectively reduce information security risks to an acceptable level, and ensure that information security is addressed t ...lying with organizational policies and procedures designed to reduce these risks ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • :* What single points of failure exist and how significant are those risks? ...
    3 KB (453 words) - 18:45, 25 April 2007
  • ::'''2. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (471 words) - 12:32, 23 June 2006
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    3 KB (460 words) - 16:08, 21 June 2006
  • ...ion assurance (IA)''' is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or ...fully considered. Thus, the IA practitioner does not seek to eliminate all risks, were that possible, but to manage them in the most [[cost-effective]] way. ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...der future flexibility for capacity additions, transition costs, technical risks and the lifetime of the investment for technology upgrades. Assess the comp ...
    4 KB (496 words) - 17:26, 21 June 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (497 words) - 14:57, 23 June 2006
  • ::'''2. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    4 KB (517 words) - 18:12, 21 June 2006
  • '''1. ISO 17799 6.2.1: The risks to the organization’s information and information processing facilities fro ...to identify any requirements for specific controls. The identification of risks related to external party access should take into account the following iss ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ...that empowers the Program to manage Information Security-related business risks.<br> ...
    4 KB (535 words) - 16:51, 25 July 2006
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.''' ...
    4 KB (524 words) - 15:03, 25 June 2006
  • ...that empowers the Program to manage Information Security-related business risks.<br> ...
    5 KB (614 words) - 16:46, 25 July 2006
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...act of unfortunate events or to maximize the realization of opportunities. Risks can come from uncertainty in financial markets, project failures, legal lia ...rder. In practice the process can be very difficult, and balancing between risks with a high probability of occurrence but lower loss versus a risk with hig ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...education and training to ensure continued awareness, and address emerging risks or topics of interest. Specific instructions and requirements for providing ...
    3 KB (418 words) - 19:53, 14 January 2014
  • ...destruction to physical components. Conceptually, those physical security risks are mitigated through zone-oriented implementations. Zones are physical are ...te preventative and detective controls in each zone to protect against the risks of:<br> ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...based on a culture that supports value delivery while managing significant risks, encourages cross-divisional co-operation and teamwork, promotes compliance ...
    4 KB (580 words) - 18:00, 23 June 2006
View ( | ) (20 | 50 | 100 | 250 | 500)