Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...e key, generally less secure than hardware schemes, but providing adequate security for many types of applications. See generally Schneier, supra note 18, at § ...
    2 KB (244 words) - 12:37, 16 October 2014
  • ...g checklist contains items commonly used as evidence by the prosecution in computer crime cases. Defense counsel should be aware of these when formulating the * Systems documentation for computer system allegedly compromised ...
    5 KB (816 words) - 15:41, 22 February 2009
  • :'''(1)''' the term '''information security''' means protecting information and information systems from unauthorized a :'''(2)''' the term '''national security system''' means any information system (including any telecommunications sy ...
    3 KB (368 words) - 00:50, 1 June 2010
  • ...d by the organization to specific standards and is not alterable by mobile computer users.'''<br> :* Examine associated endpoint firewall and security software configurations to verify that administration is restricted only au ...
    2 KB (267 words) - 10:51, 16 June 2010
  • ...or licenses computerized 'personal information' to disclose any breach of security (to any resident whose unencrypted data is believed to have been disclosed) (2) shall disclose any breach of the security of the system following discovery or ...
    3 KB (522 words) - 13:52, 26 October 2011
  • ...elecommunications equipment within an operations center will have a higher security zone than I/O operations, with the media used by that equipment stored at y ...en>'''HORSE FACTS:'''</font> Financial institutions should define physical security zones and implement appropriate preventative and detective controls in each ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...mation technology - Security techniques - Code of practice for information security management''. ...ining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C-I-A tria ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • '''DS 5.10 Network Security '''<br> ...at security techniques and related management procedures (e.g., firewalls, security appliances, network segmentation, and intrusion detection) are used to auth ...
    6 KB (781 words) - 12:31, 23 June 2006
  • A '''privilege''' in a computer system is a permission to perform an action. Examples of various privileges [[Category:Operating system security]] ...
    2 KB (341 words) - 18:37, 14 June 2007
  • ...tate, or local law enforcement officers. It may be investigated by private security personnel working for the victim as regular employees or as consultants. As ...
    2 KB (374 words) - 15:29, 22 February 2009
  • '''Incident Management''' otherwise known as '''Information Security Incident Management''', is a [[Service_Level_Management: | Service Level Ma ...tablished to ensure a quick, effective and orderly response to information security incidents.<br> ...
    9 KB (1,371 words) - 16:40, 23 May 2007
  • * [[Purpose of computer crime laws]] * [[Computer]] ...
    9 KB (1,069 words) - 20:29, 22 February 2009
  • ...ment 2: Do not use vendor-supplied defaults for system passwords and other security parameters.''']] * [[PCI 8:|'''Requirement 8: Assign a unique ID to each person with computer access.''']] ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • ...stionnaire, financially significant information systems are defined as the computer hardware and software, including system programs and application programs, ...n and are not subject to sampling. Other controls, such as programming and security authorization, are conducive to audit trail inspection and are subject to s ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ...athways into key systems. Firewalls are a key protection mechanism for any computer network.<br> ...of all services, protocols, and ports allowed, including documentation of security features implemented for those protocols considered to be insecure.]]<br> ...
    5 KB (702 words) - 12:20, 16 June 2010
  • Frequently, the computer crime defendant has all the characteristics that make him or her an excelle ...sed on his or her own recognizance need not post any bail or other form of security but must simply execute a promise to appear at all scheduled court appearan ...
    3 KB (500 words) - 16:26, 18 February 2009
  • ==Information Security Audit== ...rom auditing the physical security of data centers to the auditing logical security of databases and highlights key components to look for and different method ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produc ...bility study through maintenance of the completed application. Verify that security, availability, and process integrity requirements are included.<br> ...
    6 KB (804 words) - 12:14, 23 June 2006
  • ...ding program development, program change, access to programs and data, and computer operations, which are periodically reviewed, updated and approved by manage ::'''2. Risk: Security and business continuity risks are introduced by technical designs incompati ...
    3 KB (471 words) - 12:32, 23 June 2006
  • ...he Secretary of Commerce of standards and guidelines pertaining to Federal computer systems; (5) designate executive agents for information technology acquisit ...ive such standards when compliance would adversely affect the mission of a computer operator or cause a major adverse financial impact on such operator which i ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • Alabama Computer Crime Act — Ala. Code §§ 13A-8-100 to 13A-8-103 Colo. Rev. Stat. tit. 18, art. 5.5 — Computer crime<br> ...
    9 KB (1,358 words) - 22:11, 5 September 2011
  • ...rs shall abide by and comply with any and all copyright laws pertaining to computer software and by any software license agreements that are legally applicable The Chief Information Security Officer (CISO) approves the Software Acceptable Use Standard. The CISO also ...
    7 KB (953 words) - 14:13, 1 May 2010
  • ==Computer Fraud and Abuse Act== ...hes anyone who not just commits or attempts to commit an offense under the Computer Fraud and Abuse Act but also those who conspire to do so.<br> ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • :'''(1)''' having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such :'''(2)''' intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains--<b ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • ...am development, '''''program change''''', access to programs and data, and computer operations, which are periodically reviewed, updated and approved by manage ISO 8.1 Operational procedures and responsibilities 10.5 Security in development and support processes. ...
    4 KB (537 words) - 13:57, 23 June 2006
  • ...oftware and hardware, is relatively easy to implement, and requires little computer memory. As a new encryption standard, it is currently being deployed on a l ...e state; it cyclically shifts the bytes in each row by a certain [[Offset (computer science)|offset]]. For AES, the first row is left unchanged. Each byte of t ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ...software is available. When a system needs hardware or software upgrade, a computer technician can access the configuration management program and database to ...ount management]], [[fault management]], [[performance management]], and [[security management]].<br> ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produc ...bility study through maintenance of the completed application. Verify that security, availability, and process integrity requirements are included.<br> ...
    6 KB (863 words) - 13:12, 23 June 2006
  • :1. physical access, e.g. to offices, computer rooms, filing cabinets; ...or the continuation of external party access in the case of an information security incident; ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ## Virus detection shall not be disabled on any computer resources equipped with anti-virus protection. ...tware upgrades shall be expedited, as necessary, to effectively respond to security advisories or findings from assessment and monitoring activities. ...
    5 KB (765 words) - 20:00, 15 January 2014
  • :* Replicate itself within a computer and transmit itself between computers. :* Host hardening, including patch application and security-minded configurations of the operating system (OS), browsers, and other net ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ...ations where the terminology is similar. For example, from the information security point of view, "digital signature" means the result of applying to specific ...These Guidelines use "digital signature" only as it is used in information security terminology, as meaning the result of applying the technical processes desc ...
    22 KB (3,420 words) - 15:18, 3 April 2007
  • ...took the premise and integrated the Security Trifecta philosophy of cyber security with Governance, Technology and Vigilance. The process is technically relia ...r the natural rhythm of the process being audited, including the timing of computer and business processes as well as the timing and availability of auditors t ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...force the security controls we need to comply with the companies corporate security policy.<br> * Authorization and user security administration ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...veryday life; examples include security of automated teller machine cards, computer passwords, and electronic commerce all depend on cryptography. ...ccessive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and m ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • :* Information Security :* SP-10; Control And Security Risks in Electronic Imaging Systems, December 1993<br> ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...PATRIOT Act, the Homeland Security Act and other laws focused on national security, Congress has been active in changing the legal landscape for access to rea ===Computer Fraud and Abuse Act=== ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • Users' Security Handbook The Users' Security Handbook is the companion to the Site Security ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • ...collection, use, disclosure and retention of information; and employ data security practices. The European Commission has deemed the PIPED Act “adequate” unde (4) Security of personal data. This principle requires appropriate security measures to be applied to all personal data (including data that is not in ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • ...c Operational Readiness Security Evaluation is a comprehensive information security framework designed to be accessible, extensible, comprehensive, and collabo ...| COBIT]]) is another approach to standardize good information technology security and control practices. This is done by providing tools to assess and measu ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...PATRIOT Act, the Homeland Security Act and other laws focused on national security, Congress has been active in changing the legal landscape for access to rea ...ing, National Security and the “Adverse Inference” Problem, 22 SANTA CLARA COMPUTER & HIGH TECH. L.J. 757, 764-766 (2006); Susan Freiwald, Uncertain Privacy: C ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • '''Can you mitigate database security risks?'''<br> ...ng data for order fulfillment, employee identification data such as social security numbers, and storing customer data such as shipping addresses and credit ca ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...h only peripherally addressed BCP to improve an organization's information security procedures. BS 25999's applicability extends to all organizations. In 2007, * Hacker (computer security)|Cyber attack ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ==Security== ...would require that organizations report to the OPC 'any material breach of security safeguards involving personal information under its control'. The proposed ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ...privacy and security requirements and payment card industry ([[PCI:|PCI]]) security standards put a further onus on companies to stay abreast of ever-changing ==Privacy and Security Trade-offs== ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ===Title III: Computer Maintenance Competition Assurance Act=== ...computers could make certain temporary, limited copies while working on a computer. ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • #[[Amazon Web Services Security White Paper | Amazon Web Services Security White Paper]] #[[Applied Discovery Data Security & Privacy | Applied Discovery Data Security & Privacy]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...electronic documents or business data from one computer system to another computer system, i.e. from one trading partner to another trading partner without hu ..., specifying that "in EDI, the usual processing of received messages is by computer only. Human intervention in the processing of a received message is typical ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ::* Regulatory, audit, and security reports from key service providers ...rts, resolution of audit findings, format and contents of work papers, and security over audit materials.<br> ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...h Cir. 1991). The owner of the trade secret must, however, take reasonable security measures when it does disclose the information, such as requiring non-discl ## The extent of the security measures taken by the owner of the trade secret need not be absolute, but m ...
    7 KB (1,065 words) - 16:48, 13 April 2011
View ( | ) (20 | 50 | 100 | 250 | 500)