Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (442 words) - 13:59, 23 June 2006
  • ...formation Security Program to manage Information Security-related business risks.<br> ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...re based on risk assessments, cost-effectively reduce information security risks to an acceptable level, and ensure that information security is addressed t ...lying with organizational policies and procedures designed to reduce these risks ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • :* What single points of failure exist and how significant are those risks? ...
    3 KB (453 words) - 18:45, 25 April 2007
  • ::'''2. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (471 words) - 12:32, 23 June 2006
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    3 KB (460 words) - 16:08, 21 June 2006
  • ...ion assurance (IA)''' is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or ...fully considered. Thus, the IA practitioner does not seek to eliminate all risks, were that possible, but to manage them in the most [[cost-effective]] way. ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...der future flexibility for capacity additions, transition costs, technical risks and the lifetime of the investment for technology upgrades. Assess the comp ...
    4 KB (496 words) - 17:26, 21 June 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    3 KB (497 words) - 14:57, 23 June 2006
  • ::'''2. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    4 KB (517 words) - 18:12, 21 June 2006
  • '''1. ISO 17799 6.2.1: The risks to the organization’s information and information processing facilities fro ...to identify any requirements for specific controls. The identification of risks related to external party access should take into account the following iss ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ...that empowers the Program to manage Information Security-related business risks.<br> ...
    4 KB (535 words) - 16:51, 25 July 2006
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.''' ...
    4 KB (524 words) - 15:03, 25 June 2006
  • ...that empowers the Program to manage Information Security-related business risks.<br> ...
    5 KB (614 words) - 16:46, 25 July 2006
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...act of unfortunate events or to maximize the realization of opportunities. Risks can come from uncertainty in financial markets, project failures, legal lia ...rder. In practice the process can be very difficult, and balancing between risks with a high probability of occurrence but lower loss versus a risk with hig ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...education and training to ensure continued awareness, and address emerging risks or topics of interest. Specific instructions and requirements for providing ...
    3 KB (418 words) - 19:53, 14 January 2014
  • ...destruction to physical components. Conceptually, those physical security risks are mitigated through zone-oriented implementations. Zones are physical are ...te preventative and detective controls in each zone to protect against the risks of:<br> ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...based on a culture that supports value delivery while managing significant risks, encourages cross-divisional co-operation and teamwork, promotes compliance ...
    4 KB (580 words) - 18:00, 23 June 2006
  • ...art of the security process. Risk assessments should consider the changing risks that appear in business continuity scenarios and the different security pos ...and consideration of preventive and mitigating controls in light of these risks<br> ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ...paths of a social or political environment and possibly diplomatic and war risks. For example, in the recent Iraq War, the Pentagon certainly had to model a ...
    4 KB (607 words) - 18:29, 16 February 2007
  • ...an effective audit function that may be relied upon to identify and manage risks. ...sight have appropriate level of experience and knowledge of IT and related risks ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...is to be protected against risks. Security is the means to be safe against risks. When protecting information it is the value of the information that has to ...s in the IT-infrastructure and changes in the organization itself security risks are bound to change over time. The maintenance of the security concerns bot ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ::'''3. Risk: Third party processors create unacceptable control risks to the Company. ''' ...
    5 KB (674 words) - 18:14, 21 June 2006
  • ...key control objectives relating to the mitigation of information security risks, are satisfied. This helps keep the standard relevant despite the evolving ...and sizes of organization according to the particular information security risks they face. In practice, this flexibility gives users a lot of latitude to a ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...is the first place to start when conducting gap analysis and deciding what Risks are relevant to the assets. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...cost of a risk exposure and what the appropriate costs of mitigating those risks should be.<br> ...uently, the business mission, from information technology related security risks. Each organization is unique and the thresholds for how much risk it is wil ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...ic review against business needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requirements.<br> ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...s document, provided by CERT, gives home users an overview of the security risks and countermeasures associated with Internet connectivity, especially in th ...concepts needed to read through the hype in the marketplace and understand risks and how to deal with them.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...formation Security Program to manage Information Security-related business risks.<br> ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ...ch as support issues and upgrades, periodic review against business needs, risks and security requirements.<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ::ISO 17799 defines Personnel Security objectives to reduce risks of human error, theft, fraud, or misuse of facilities; ensure that users ar ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...and control issues associated with the institution’s operations, including risks in new products, emerging technologies, information systems, and electronic '''Control issues and risks associated with reliance on technology can include:''' ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...need to put aside to guard against the types of financial and operational risks banks (and the whole economy) face. One focus was to maintain sufficient c ...k that a bank faces: credit risk, operational risk, and market risk. Other risks are not considered fully quantifiable at this stage. ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    6 KB (804 words) - 12:14, 23 June 2006
  • ...the longest time the business can allow for without incurring significant risks or significant loss, allowing system designers to specify designs that are ...refully shares (or "syndicates") hardware between them, according to these risks. ...
    13 KB (2,264 words) - 11:10, 27 October 2012
  • ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'''<br> ...
    6 KB (846 words) - 13:52, 4 May 2006
  • ::'''2. Risk: Third party processors create unacceptable control risks to the Company. ''' ...
    6 KB (870 words) - 18:08, 21 June 2006
  • ...f the budget process a process for analyzing, tracking, and evaluating the risks and results of all major capital investments in information systems by exec ...h agency a process for maximizing the value and assessing and managing the risks of information technology acquisitions. Directs such agency heads to utiliz ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...[SOX.2.0.14:| '''SOX.2.0.14''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in t ...ed by linking to audio and video files exposes an organization to multiple risks. The first risk is that sensitive information may be contained in the direc ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...ment and treatment]] - analysis of the organization's information security risks ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...ts on the one hand and, on the other, the value of the information and the risks in the processing environment. Security forms an important added value for ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ...that empowers the Program to manage Information Security-related business risks.<br> ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disasters or fires, ac ...ater. In practice the process can be very difficult, and balancing between risks with a high probability of occurrence but lower loss vs. a risk with high l ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • [[PO9:| '''9 Assess and Manage IT Risks''']]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ::'''3. Risk: Third party processors create unacceptable control risks to the Company.''' ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ISO 17799 defines Personnel Security objectives to reduce risks of human error, theft, fraud, or misuse of facilities; ensure that users ar ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • :b) establishing a formal policy to protect against risks associated with obtaining files and software either from or via external ne ...
    8 KB (1,177 words) - 19:00, 25 June 2006
View ( | ) (20 | 50 | 100 | 250 | 500)