Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...on mechanisms, information integrity, access control, backup and design of audit trails.<br> ...
    2 KB (307 words) - 15:06, 3 May 2006
  • ==Information Security Audit== ...ination_Procedures | Information Technology Audit]] or a computer security audit. However, information security encompasses much more than IT. Auditing info ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ==Audit Guidance Examination Procedures== ...ion related to IT controls. These procedures will disclose the adequacy of audit coverage and to what extent, if any, the examiner may rely upon the procedu ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...nt]]s, on a more frequent basis. Technology plays a key role in continuous audit activities by helping to automate the identification of exceptions or anoma ...constantly for errors, fraud, and inefficiencies. It is the most detailed audit. ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...exceeds business retention requirements. Alternatively, performance of an audit, at least on a quarterly basis, to verify that stored cardholder data does ...
    3 KB (420 words) - 14:46, 28 February 2007
  • ...zation through a single audit event in a sustainable fashion completing an audit in one pass, testing evidence in one pass, and constructing a sustainable p ...nt contributions and innovations such as the [https://auditmachine.com/ IT Audit Machine], [http://policymachine.com/ The Policy Machine], [https://lazarusa ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...mpliance with laws and regulations. Required internal control measures and audit trails should be identified as part of these requirements.<br> ...
    2 KB (269 words) - 23:52, 14 June 2007
  • ...egregation of duties among those who build, test and operate; and adequate audit trails of all actions.<br> ...
    3 KB (382 words) - 18:02, 3 May 2006
  • :* IT Audit ===Audit=== ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ===Start with a comprehensive audit of all software assets used in your enterprise.=== ...http://www.palamida.com Palamida] provide solutions that can automate this audit process and streamline ongoing compliance efforts.<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...ted from the old system to the new according to a pre-established plan. An audit trail of pre- and post-conversion results should be developed and maintaine ...
    3 KB (436 words) - 12:51, 23 June 2006
  • :::'''PCI-3.4 D:''' Examine a sample of audit logs to confirm that cardholder data is sanitized or removed from the logs. ...
    4 KB (486 words) - 11:53, 28 March 2008
  • ...mpany’s particular control environment, as well as an understanding of the audit intent of each question. This can generally be achieved if the company invo ...controls, such as programming and security authorization, are conducive to audit trail inspection and are subject to sampling. For those controls subject to ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ITIL 4.3 Audit and evaluate.<br> ...
    3 KB (420 words) - 14:06, 8 August 2006
  • ...pply for a “seal” approving their privacy policies, agree to be subject to audit by the seal program and pay a licensing fee. However the seal programs have ...
    2 KB (251 words) - 09:52, 16 September 2011
  • The problem management system should provide for adequate audit trail facilities that allow tracking, analyzing and determining the root ca ...
    3 KB (451 words) - 17:52, 5 May 2006
  • [[Image:account-audit-flow.jpg]]<br> ...
    3 KB (459 words) - 17:56, 21 June 2006
  • * PCI-10.2.3 Access to all audit trails.<br> * PCI-10.2.6 Initialization of the audit logs.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...[[Media:Oracle_Audit_UNIX_Script.txt]] provides an excellent comprehensive audit examination that has stood up to many professional Oracle compliance audits ...hip in special operating system-defined groups. To effectively control and audit privileged access to the database, only the "Oracle" account ID is allowed ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • For the purpose of the [[Security Audit Procedures]], the following definitions will be used:<br> ::'''A.1.3:''' Ensure logging and audit trails are enabled and unique to each entity’s cardholder data environment ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • ...dify, or delete signatures, auditing features, configuration files, and/or audit logs.<br> ::1. Manual detection or reviewing audit logs should be performed to avoid sole reliance on the automated threat mon ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ...rial trends, monitor standards and [[Information_Security_Audit | security audit]] assessment methods and provide suitable liaison points when dealing with ...
    3 KB (470 words) - 13:39, 6 March 2007
  • * ISO 17799 10.1.2: When changes are made, an audit log containing all relevant information should be retained.<br> * ISO 17799 12.5.1: An audit trail is maintained for all change requests.<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...dures. On a regular base this compliance should be checked by a [[software audit]]. This activity covers an independent evaluation of the conformance of the ...us of several elements of the configuration. The main purpose of this last audit is to check if the current baseline meets the specifications. ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ...ree sorts of evaluation; the Self assessment; internal audit, and external audit.<br> | Internal Audit. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • '''Printouts of operating system audit files:''' Computer printouts which showed times at which defendant accessed ...
    3 KB (506 words) - 20:06, 22 February 2009
  • The Company reserves the right to monitor, record, or periodically audit use of any of its information and telecommunications systems and equipment. ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ...7.7:|'''SOX.2.7.7''']] The problem management system provides for adequate audit trail facilities, which allow tracing from incident to underlying cause. ...
    4 KB (601 words) - 15:01, 8 August 2006
  • The Company reserves the right to monitor, record, or periodically audit use of any of its information and telecommunications systems and equipment. ...
    4 KB (507 words) - 14:58, 21 January 2014
  • # Specified officials for audit or evaluation purposes; ...
    3 KB (470 words) - 19:08, 19 April 2010
  • ...requirements are met by all components. The test data should be saved for audit trail purposes and for future testing.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • Section 9 - Exercising, maintenance, audit and self-assessment of the BCM culture. Without testing the BCM response an ...ure that the BCMS is continually monitored the Check stage covers internal audit and management review of the BCMS ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...not limited to Information Security, Information Technology, and Internal Audit.<br> ...not limited to Information Security, Information Technology, and Internal Audit should be provided with a quarterly report on the following vulnerability m ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • :'''(2)''' may be based in whole or in part on an audit, evaluation, or report relating to programs or practices of the applicable ...
    4 KB (634 words) - 13:00, 4 June 2010
  • ...found on computer; university's policies and procedures reserved right to audit and monitor Internet use and warned that information flowing through the un ...
    5 KB (741 words) - 18:58, 22 February 2009
  • ...evaluation required by this section may be based in whole or in part on an audit, evaluation, or report relating to programs or practices of the applicable ...
    4 KB (682 words) - 19:17, 3 June 2010
  • Auditing must be activated to record relevant security events. The audit logs must be securely maintained for a reasonable period of time. Specific ...
    5 KB (673 words) - 18:16, 14 January 2014
  • ...imize the effectiveness of and to minimize interference to/from the system audit process. This section provides templates for an Information Security Progra ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...]) is an advanced certification created in 2007 by the Information Systems Audit and Control Association (ISACA). It is designed for experienced professiona *[http://auditmachine.com The IT Audit Machine] ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ::[[Image:Key-control.jpg]][[PCI-12.8.4:|PCI-12.8.4 Audit provisions that ensure that Payment Card Industry representative, or a Paym ...
    7 KB (988 words) - 19:11, 7 July 2006
  • :* Ability to conduct audit coverage of security controls or obtain adequate reports of security testin ...
    6 KB (829 words) - 19:14, 17 April 2007
  • ITIL 4.3 Audit and evaluate security reviews of IT systems.<br> ...
    6 KB (846 words) - 13:52, 4 May 2006
  • * Documentation for EDP audit packages used to detect method of crime ...
    5 KB (816 words) - 15:41, 22 February 2009
  • * PCI-12.8.4 "Audit provisions that ensure that Payment Card Industry representative, or a Paym ...
    7 KB (958 words) - 16:01, 25 June 2006
  • :::K. The system must protect against deletion or alteration of audit records or logs from any source other than a specific program or person int ...periodically reviewed to evaluate the security of the system, and validate audit controls.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • *[[Information technology audit]] *[[Computer security audit]] ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • * Rights to monitor and audit activities<br> ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ...more appropriate for audit and compliance purposes. Keep in mind detailed audit logging grows exponentially. It requires a significant amount of time to ac ...
    20 KB (3,195 words) - 02:47, 23 February 2007
  • ...printouts that contain the information. Periodically, the security staff, audit staff, and data owners should review authorization levels and distribution ...
    9 KB (1,246 words) - 18:20, 10 April 2007
  • * Appropriate audit logs maintained to track changes<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
View ( | ) (20 | 50 | 100 | 250 | 500)