Search results

Jump to navigation Jump to search
View ( | next 50) (20 | 50 | 100 | 250 | 500)
  • [[AI1.2:| 1.2 Risk Analysis Report]]<br> [[AI6.2:| 6.2 Impact Assessment, Prioritization and Authorization]]<br> ...
    3 KB (341 words) - 19:07, 14 June 2007
  • ...zone. The requirements for each zone should be determined through the risk assessment.<br> '''The risk assessment should include, but is not limited to, the following threats:'''<br> ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actuarial assessments ...of the risk, and accepting some or all of the consequences of a particular risk. ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...anized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by the exercise of vul ...am for a commercial enterprise, the processes of calculating the cost of a risk exposure and what the appropriate costs of mitigating those risks should be ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...ost and Risk of Complex Matters | Active Management to Reduce the Cost and Risk of Complex Matters]] ...the risk a... | Avoid that feeling of uncertainty: the power to reduce the risk a...]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...refers to the formal authorization for system operation and acceptance of risk by an accrediting authority.<br> ::1. Risk Assessment:<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...uidelines''' defines objectives for establishing specific standards on the assessment and ongoing management of wireless technologies utilized for the extension ...refers to the likelihood of loss, damage, or injury to information assets. Risk is present if a threat can exploit an actual vulnerability to adversely imp ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • '''Risk Association Control Activities:''' ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ...nvestment practices. Generally speaking, these rules mean that the greater risk to which the bank is exposed, the greater the amount of capital the bank ne # Ensuring that Capital requirement is more risk sensitive; ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ==Risk Association Control Activities:== ...s and security staff, and specialist skills in areas such as insurance and risk management.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...dentify and provide information security protections commensurate with the risk and magnitude of the harm resulting from the unauthorized access, use, disc ::'''(B)''' an assessment of the development, promulgation, and adoption of, and compliance with, sta ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ...hould be allotted into various areas: policy, awareness and training, risk assessment, technology, and process.<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ==Risk Management== ...cepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. na ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...ports associated with IT. Refer to [[Risk Assessment and Treatment: | Risk Assessment and Treatment]] for more guidance. Audit management should oversee the staf ...intain or improve the efficiency and effectiveness of the institution’s IT risk management, internal controls, and corporate governance.<br> ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...ample Information Security Program Charter''']], the Company will follow a risk management approach to develop and implement Information Security policies, ...intended to address the specific requirements identified via a formal risk assessment. The standard is also intended to provide a guide for the development of or ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...ed return on investment, but also significant risk of noncompliance (legal risk).<br> ...it or commercial-centric) dramatically affect factors such as maturity and risk.<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...ample Information Security Program Charter''']], the Company will follow a risk management approach to develop and implement Information Security policies, ...intended to address the specific requirements identified via a formal risk assessment. The standard is also intended to provide a guide for the development of or ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ...n Guidelines defines objectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...refers to the likelihood of loss, damage, or injury to information assets. Risk is present if a threat can exploit an actual vulnerability to adversely imp ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • ...II objectives and procedures provide additional validation as warranted by risk to verify the effectiveness of the institution’s audit function. Tier II qu :1. Review past reports for outstanding issues, previous problems, or high-risk areas with insufficient coverage related to IT. Consider: ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • :::B. Perform risk assessment:<br> :::F. Conduct independent vulnerability assessment of the system, including the infrastructure and application.<br> ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or third parties have inappropriate acce ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...ormation where a reasonable person would consider that there exists a real risk of significant harm to an individual as a result. * An assessment of the risk of harm to individuals as a result of the loss or unauthorized access or di ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ...ssues such as auditor independence, corporate governance, internal control assessment, and enhanced financial disclosure. ...relationship, conceivably placing a significant consulting arrangement at risk, damaging the auditing firm's bottom line. ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • * Intrusion detection and security risk assessment ...ion, possibly filling up your disks. Backup logs periodically to avoid the risk of filling up your disks. The logs should be written to a mount point/direc ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...made in accordance with the Change Control Standard; supporting test, risk assessment, and documentation efforts; and participating in restoration efforts, as re ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...a coverage of compromised business web sites show us that databases are at risk.<br> The risk is so great, in fact, that the world's largest payment networks, Visa and M ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...engineering, system engineering, project management, software maintenance, risk management, system acquisition, information technology (IT), services, busi ...r comparison and as an aid to understanding - for example, for comparative assessment of different organizations where there is something in common that can be u ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...l institutions should review access rights on a schedule commensurate with risk.<br> Depending on the risk associated with the access, authorized internal users should generally rece ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...organizations establish [[Compliance and Ethics Programs]] to minimize the risk that the firm steps outside of ethical and legal boundaries. *oversight and management of risk ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...s highlighted in a 1989 article by Kathleen Eisenhardt ("Agency theory: an assessment and review", Academy of Management Review). ...strategy will largely eliminate individual company financial risk or other risk and, therefore, these investors have even less interest in a particular com ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • : Guarantees that trades will go through by legally assuming the risk of payments not made or securities not delivered. ...generally flow toward the institution funding the transaction and assuming risk in the process. In a credit card transaction, the interchange fee is paid b ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...ictim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition p ...or knowingly and with reckless disregard of a substantial an unjustifiable risk that such transmission will cause damage to or deny usage of such computer ...
    85 KB (12,600 words) - 16:49, 1 March 2009
View ( | next 50) (20 | 50 | 100 | 250 | 500)