Search results

Jump to navigation Jump to search
View ( | next 50) (20 | 50 | 100 | 250 | 500)
  • ::'''(C)''' ensuring that information security management processes are integrated with agency strategic and operational planning pro :::'''(iii)''' minimally acceptable system configuration requirements, as determined by the agency; and<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ::5. All signatures and configuration of Company threat monitoring or intrusion detection technologies should be ...o attempts to deactivate, modify, or delete signatures, auditing features, configuration files, and/or audit logs.<br> ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ::'''(C)''' ensuring that information security management processes are integrated with agency strategic and operational planning pro :::'''(iii)''' minimally acceptable system configuration requirements, as determined by the agency; and<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • ...the agencies and revised, if necessary, based on examiner feedback. Senior management of each agency performed the final review and approval and then formally re :* IT Management ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source sof ===Extend vulnerability management to open-source solutions.=== ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...ormation Security Committee is comprised of lawyers, government policy and management professionals, information technology and security professionals, notaries ...in order to improve security. This document is about basic, "boilerplate" configuration items that are almost universally applicable in IP networks, and about a fe ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...browser security settings to be less restrictive than the Company-approved configuration.<br> ...cated and understood within their respective organizational units. Company management also is responsible for defining, approving, and implementing processes and ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • * Authentication and password management # Database Configuration ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...Name>''' (the "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for prop ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for follow ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]]s that are intended to support businesses in achieving both qu ...s (hence the term ''Library''), each of which covers a core area within IT Management. The names ''ITIL'' and ''IT Infrastructure Library'' are Registered Trade ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • Security administrators SHOULD consider issues related to privilege management for all types of users. For example, in a database with many usernames, it ...he benefits offered by roles. Roles greatly simplify the task of privilege management in complicated environments.<br> ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...individual keys for [[Encryption | encryption]] may raise significant key management issues. ...usiness systems. The roles of databases are many, including storing system configuration parameters and credentials, providing raw content for use in dynamic page g ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ==Risk Management== ...ng some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disas ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • Management and information system administrators should critically evaluate informatio ...ning, and signify their understanding and agreement with the policy before management grants access to the system.<br> ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • '''Account management''' ...ies (e.g., general ledger, manufacturing resource planning, human resource management). ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ** The policies and procedures must reference management oversight and organizational buy-in to compliance with the documented secur ...ation technology documentation should also include a written record of all configuration settings on the components of the network because these components are comp ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...own. Browsers, mail readers, chat clients, and other programs leave behind configuration files that might reveal online nicknames and passwords. Operating systems a ...h warrant into an unconstitutional general warrant. United States v. Fleet Management Ltd., 521 F. Supp. 2d 436, 443-44 (E.D. Pa. 2007); see also Otero, 563 F.3d ...
    138 KB (21,660 words) - 13:18, 5 August 2011
View ( | next 50) (20 | 50 | 100 | 250 | 500)