Search results

Jump to navigation Jump to search

Page title matches

  • ==IT Audit Roles and Responsibilities== ...e important element of an effective internal control system is an internal audit function that includes adequate IT coverage.<br> ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ==Security Audit Guidance== ...audit guidance, please refer to [[Audit_Guidance_Examination_Procedures | Audit Guidance Examination Procedures]] ...
    5 KB (665 words) - 14:40, 11 April 2007
  • ==Information Security Audit== ...ination_Procedures | Information Technology Audit]] or a computer security audit. However, information security encompasses much more than IT. Auditing info ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...g rules. Also, if fraud occurs and your organization has not completed the audit requirements, financial and legal responsibility will be placed more heavil ...
    2 KB (235 words) - 09:48, 23 October 2012
  • ==Audit Guidance Examination Procedures== ...ion related to IT controls. These procedures will disclose the adequacy of audit coverage and to what extent, if any, the examiner may rely upon the procedu ...
    32 KB (4,518 words) - 17:53, 11 April 2007

Page text matches

  • ...s and determine that they include audit log retention policies and require audit log retention for at least one year. ...insert number and/or description of sample) system components, verify that audit logs are available online or on tape for at least one year. ...
    415 bytes (66 words) - 15:25, 21 February 2007
  • :'''PCI-10.2 Implement automated audit trails to reconstruct the following events, for all system components:'''<b ::[[Image:Key-control.jpg]][[PCI-10.2.3:|PCI-10.2.3 Access to all audit trails.]]<br> ...
    4 KB (530 words) - 17:53, 7 July 2006
  • :'''Retain your audit trail history for a period that is consistent with its effective use, as we :* An audit history usually covers a period of at least one year, with a minimum of thr ...
    2 KB (332 words) - 21:09, 2 March 2007
  • :'''Implement automated audit trails to reconstruct the following events, for all system components:'''<b :* Confirm though inquiry, review of audit logs, and review of audit log settings for (insert as-of dates) for the samples of (insert number and ...
    2 KB (291 words) - 20:37, 2 March 2007
  • :'''Implement automated audit trails to reconstruct the following events, for all system components:'''<b :* Confirm though inquiry, review of audit logs, and review of audit log settings for (insert as-of dates) for the samples of (insert number and ...
    2 KB (290 words) - 20:39, 2 March 2007
  • :'''Implement automated audit trails to reconstruct the following events, for all system components:'''<b :* Confirm though inquiry, review of audit logs, and review of audit log settings for (insert as-of dates) for the samples of (insert number and ...
    2 KB (290 words) - 20:36, 2 March 2007
  • :'''Implement automated audit trails to reconstruct the following events, for all system components:'''<b :* Confirm though inquiry, review of audit logs, and review of audit log settings for (insert as-of dates) for the samples of (insert number and ...
    2 KB (292 words) - 20:38, 2 March 2007
  • :'''Implement automated audit trails to reconstruct the following events, for all system components:'''<b :* Confirm though inquiry, review of audit logs, and review of audit log settings for (insert as-of dates) for the samples of (insert number and ...
    2 KB (290 words) - 20:37, 2 March 2007
  • :'''Implement automated audit trails to reconstruct the following events, for all system components:'''<b :* Confirm though inquiry, review of audit logs, and review of audit log settings for (insert as-of dates) for the samples of (insert number and ...
    2 KB (296 words) - 20:36, 2 March 2007
  • :'''Implement automated audit trails to reconstruct the following events, for all system components:'''<b :* Confirm though inquiry, review of audit logs, and review of audit log settings for (insert as-of dates) for the samples of (insert number and ...
    2 KB (293 words) - 20:40, 2 March 2007
  • ...7.7:|'''SOX.2.7.7''']] The problem management system provides for adequate audit trail facilities, which allow tracing from incident to underlying cause. 1. Determine if the organization’s procedures include audit trail facilities—tracking of the incidents. ...
    2 KB (297 words) - 19:19, 25 June 2006
  • ## The Company shall employ a centralized audit-logging scheme such that audit logs are securely written to a centralized log system. ## The centralized log system shall provide a mechanism for archiving audit logs in accordance with applicable legal and regulatory requirements. ...
    3 KB (444 words) - 20:12, 15 January 2014
  • ...ist on the staff? Please provide the name and phone number of the internal audit contact person or senior IS specialist responsible for providing assistance ...A.4''']] Are periodic tests or reviews of the system made by the internal audit staff to ensure that controls are functioning in accordance with establishe ...
    2 KB (354 words) - 20:12, 25 June 2006
  • ==Security Audit Guidance== ...audit guidance, please refer to [[Audit_Guidance_Examination_Procedures | Audit Guidance Examination Procedures]] ...
    5 KB (665 words) - 14:40, 11 April 2007
  • :'''Secure audit trails so they cannot be altered in any way, including the following:'''<br ::'''PCI-10.5.1:''' Only individuals who have a job-related need can view audit trail files. ...
    2 KB (275 words) - 21:01, 2 March 2007
  • :'''Secure audit trails so they cannot be altered in any way, including the following:'''<br ::'''PCI-10.5.3:''' Current audit trail files are promptly backed up to a centralized log server or media tha ...
    2 KB (283 words) - 21:02, 2 March 2007
  • :'''Record at least the following audit trail entries for each event, for all system components:'''<br> ...on, for each auditable event mentioned in [[PCI_10: | PCI-10.2]], that the audit trail captures the following information: ...
    2 KB (274 words) - 20:44, 2 March 2007
  • :'''Record at least the following audit trail entries for each event, for all system components:'''<br> ...on, for each auditable event mentioned in [[PCI_10: | PCI-10.2]], that the audit trail captures the following information: ...
    2 KB (274 words) - 20:47, 2 March 2007
  • :'''Record at least the following audit trail entries for each event, for all system components:'''<br> ...on, for each auditable event mentioned in [[PCI_10: | PCI-10.2]], that the audit trail captures the following information: ...
    2 KB (273 words) - 20:43, 2 March 2007
  • :'''Record at least the following audit trail entries for each event, for all system components:'''<br> ...on, for each auditable event mentioned in [[PCI_10: | PCI-10.2]], that the audit trail captures the following information: ...
    2 KB (275 words) - 20:45, 2 March 2007
  • :'''Record at least the following audit trail entries for each event, for all system components:'''<br> ...on, for each auditable event mentioned in [[PCI_10: | PCI-10.2]], that the audit trail captures the following information: ...
    2 KB (280 words) - 20:46, 2 March 2007
  • :'''Secure audit trails so they cannot be altered in any way, including the following:'''<br ::'''PCI-10.5.2:''' Current audit trail files are protected from unauthorized modifications via access contro ...
    2 KB (282 words) - 21:01, 2 March 2007
  • :'''Record at least the following audit trail entries for each event, for all system components:'''<br> ...on, for each auditable event mentioned in [[PCI_10: | PCI-10.2]], that the audit trail captures the following information: ...
    2 KB (281 words) - 20:48, 2 March 2007
  • ::'''1. PCI-10.5.1 Limit viewing of audit trails to those with a job-related need.''' ::'''2. PCI-10.5.2 Protect audit trail files from unauthorized modifications.''' ...
    3 KB (377 words) - 18:52, 4 May 2006
  • ...ze the effectiveness of and to minimize interference to or from the system audit process. This section provides templates for an Information Security Progra ==Information systems audit considerations== ...
    6 KB (774 words) - 12:41, 25 May 2007
  • ...rance services to provide the board—this will occur most likely through an audit committee—with timely independent assurance about the compliance of IT with ISO12.3 System audit considerations.<br> ...
    2 KB (300 words) - 13:39, 4 May 2006
  • ...ants or certification bodies. Qualifications of individuals performing the audit must be ensured.<br> ...
    2 KB (294 words) - 13:08, 4 May 2006
  • Documentation for EDP audit packages used to detect method of crime as subject of discovery is discusse ...
    522 bytes (72 words) - 10:44, 5 March 2009
  • Association for Computing Machinery Special Interest Group on Security Audit and Control, 11 W 42 St., New York NY 10036 (212) 869-7440. ...
    631 bytes (82 words) - 02:56, 5 March 2009
  • ...ailability, and testing. Perform a [[Information_Security_Audit | security audit]] reassessment when significant technical or logical discrepancies occur du ...
    2 KB (329 words) - 13:35, 6 March 2007
  • * '''Audit:''' Review and audit are required to ensure that the organization’s CM process is adhered to and :'''Primary forms of audit include:''' ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ...g rules. Also, if fraud occurs and your organization has not completed the audit requirements, financial and legal responsibility will be placed more heavil ...
    2 KB (235 words) - 09:48, 23 October 2012
  • Implement internal control, security and audit ability measures during configuration, integration and maintenance of hardw ...
    1 KB (146 words) - 17:19, 7 June 2006
  • ...ontrol.jpg]][[PCI-9.1.1:|PCI-9.1.1 Use cameras to monitor sensitive areas. Audit this data and correlate with other entries. Store for at least three months ...Key-control.jpg]][[PCI-9.4:|PCI-9.4 Use a visitor log to retain a physical audit trail of visitor activity. Retain this log for a minimum of three months, u ...
    4 KB (604 words) - 15:30, 1 March 2007
  • :'''Secure audit trails so they cannot be altered in any way, including the following:'''<br ...
    2 KB (283 words) - 21:03, 2 March 2007
  • ...:''' Verify, via observation and inquiry of the system administrator, that audit trails are enabled and active, including for any connected wireless network ...
    2 KB (278 words) - 20:33, 2 March 2007
  • :'''Secure audit trails so they cannot be altered in any way, including the following:'''<br ...
    2 KB (290 words) - 21:04, 2 March 2007
  • ...ns that currently have a [[SAS 70]] service auditor’s examination (“SAS 70 audit”) performed, some changes will be required to effectively reporting under t ...ce Auditor's Report, a service organization may have to entertain multiple audit requests from its customers and their respective auditors. Multiple visits ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...-virus mechanisms are current, actively running, and capable of generating audit logs.]]<br> ...
    1 KB (199 words) - 18:10, 28 February 2007
  • :'''Use a visitor log to retain a physical audit trail of visitor activity. Retain this log for a minimum of three months, u ...
    2 KB (317 words) - 14:19, 2 March 2007
  • ==IT Audit Roles and Responsibilities== ...e important element of an effective internal control system is an internal audit function that includes adequate IT coverage.<br> ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...any of your flagship applications will not pass this test. A more complete audit will include source code reviews and other more advanced techniques to circ ...''' You will need ''WRITTEN'' permission from your company to perform this audit. Failure to obtain such permission may get you fired and or prosecuted.<br> ...
    14 KB (2,387 words) - 13:41, 4 April 2007
  • ::'''1. PCI.10.7: Retain your audit trail history for a period that is consistent with its effective use, as we ...
    2 KB (270 words) - 18:42, 5 May 2006
  • ...environment and control framework. [[Information_Security_Audit | Security audit]] assessments using industry best practices and benchmarking should be used ...
    2 KB (291 words) - 13:41, 6 March 2007
  • ...us mechanisms are current, and actively running, and capable of generating audit logs.<br> ...
    2 KB (333 words) - 18:15, 28 February 2007
  • 2. Determine if an audit trail exists of all emergency activity and verify that it is independently ...
    3 KB (372 words) - 13:56, 23 June 2006
  • ITIL 4.3 Audit and evaluate<br> ...
    2 KB (270 words) - 14:54, 5 May 2006
  • ...e considered. It is important that [[Information_Security_Audit | security audit]] remains independent.<br> ...
    4 KB (591 words) - 19:45, 14 June 2007
  • * PCI-9.1.1 Use cameras to monitor sensitive areas. Audit this data and correlate with other entries. Store for at least three months ...at the date of expiration.PCI.9.4: Use a visitor log to retain a physical audit trail of visitor activity. Retain this log for a minimum of three months, u ...
    5 KB (674 words) - 18:14, 21 June 2006
  • ...ortant professional groups are the ACM Special Interest Group on Security, Audit and Control,[[FN37]] the IEEE Security and Privacy Committee,[[FN38]] and t ...
    2 KB (298 words) - 15:17, 22 February 2009
  • ...on mechanisms, information integrity, access control, backup and design of audit trails.<br> ...
    2 KB (307 words) - 15:06, 3 May 2006
  • ==Information Security Audit== ...ination_Procedures | Information Technology Audit]] or a computer security audit. However, information security encompasses much more than IT. Auditing info ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ==Audit Guidance Examination Procedures== ...ion related to IT controls. These procedures will disclose the adequacy of audit coverage and to what extent, if any, the examiner may rely upon the procedu ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...nt]]s, on a more frequent basis. Technology plays a key role in continuous audit activities by helping to automate the identification of exceptions or anoma ...constantly for errors, fraud, and inefficiencies. It is the most detailed audit. ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...exceeds business retention requirements. Alternatively, performance of an audit, at least on a quarterly basis, to verify that stored cardholder data does ...
    3 KB (420 words) - 14:46, 28 February 2007
  • ...zation through a single audit event in a sustainable fashion completing an audit in one pass, testing evidence in one pass, and constructing a sustainable p ...nt contributions and innovations such as the [https://auditmachine.com/ IT Audit Machine], [http://policymachine.com/ The Policy Machine], [https://lazarusa ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...mpliance with laws and regulations. Required internal control measures and audit trails should be identified as part of these requirements.<br> ...
    2 KB (269 words) - 23:52, 14 June 2007
  • ...egregation of duties among those who build, test and operate; and adequate audit trails of all actions.<br> ...
    3 KB (382 words) - 18:02, 3 May 2006
  • :* IT Audit ===Audit=== ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ===Start with a comprehensive audit of all software assets used in your enterprise.=== ...http://www.palamida.com Palamida] provide solutions that can automate this audit process and streamline ongoing compliance efforts.<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...ted from the old system to the new according to a pre-established plan. An audit trail of pre- and post-conversion results should be developed and maintaine ...
    3 KB (436 words) - 12:51, 23 June 2006
  • :::'''PCI-3.4 D:''' Examine a sample of audit logs to confirm that cardholder data is sanitized or removed from the logs. ...
    4 KB (486 words) - 11:53, 28 March 2008
  • ...mpany’s particular control environment, as well as an understanding of the audit intent of each question. This can generally be achieved if the company invo ...controls, such as programming and security authorization, are conducive to audit trail inspection and are subject to sampling. For those controls subject to ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ITIL 4.3 Audit and evaluate.<br> ...
    3 KB (420 words) - 14:06, 8 August 2006
  • ...pply for a “seal” approving their privacy policies, agree to be subject to audit by the seal program and pay a licensing fee. However the seal programs have ...
    2 KB (251 words) - 09:52, 16 September 2011
  • The problem management system should provide for adequate audit trail facilities that allow tracking, analyzing and determining the root ca ...
    3 KB (451 words) - 17:52, 5 May 2006
  • [[Image:account-audit-flow.jpg]]<br> ...
    3 KB (459 words) - 17:56, 21 June 2006
  • * PCI-10.2.3 Access to all audit trails.<br> * PCI-10.2.6 Initialization of the audit logs.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...[[Media:Oracle_Audit_UNIX_Script.txt]] provides an excellent comprehensive audit examination that has stood up to many professional Oracle compliance audits ...hip in special operating system-defined groups. To effectively control and audit privileged access to the database, only the "Oracle" account ID is allowed ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • For the purpose of the [[Security Audit Procedures]], the following definitions will be used:<br> ::'''A.1.3:''' Ensure logging and audit trails are enabled and unique to each entity’s cardholder data environment ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • ...dify, or delete signatures, auditing features, configuration files, and/or audit logs.<br> ::1. Manual detection or reviewing audit logs should be performed to avoid sole reliance on the automated threat mon ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ...rial trends, monitor standards and [[Information_Security_Audit | security audit]] assessment methods and provide suitable liaison points when dealing with ...
    3 KB (470 words) - 13:39, 6 March 2007
  • * ISO 17799 10.1.2: When changes are made, an audit log containing all relevant information should be retained.<br> * ISO 17799 12.5.1: An audit trail is maintained for all change requests.<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...dures. On a regular base this compliance should be checked by a [[software audit]]. This activity covers an independent evaluation of the conformance of the ...us of several elements of the configuration. The main purpose of this last audit is to check if the current baseline meets the specifications. ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ...ree sorts of evaluation; the Self assessment; internal audit, and external audit.<br> | Internal Audit. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • '''Printouts of operating system audit files:''' Computer printouts which showed times at which defendant accessed ...
    3 KB (506 words) - 20:06, 22 February 2009
  • The Company reserves the right to monitor, record, or periodically audit use of any of its information and telecommunications systems and equipment. ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ...7.7:|'''SOX.2.7.7''']] The problem management system provides for adequate audit trail facilities, which allow tracing from incident to underlying cause. ...
    4 KB (601 words) - 15:01, 8 August 2006
  • The Company reserves the right to monitor, record, or periodically audit use of any of its information and telecommunications systems and equipment. ...
    4 KB (507 words) - 14:58, 21 January 2014
  • # Specified officials for audit or evaluation purposes; ...
    3 KB (470 words) - 19:08, 19 April 2010
  • ...requirements are met by all components. The test data should be saved for audit trail purposes and for future testing.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • Section 9 - Exercising, maintenance, audit and self-assessment of the BCM culture. Without testing the BCM response an ...ure that the BCMS is continually monitored the Check stage covers internal audit and management review of the BCMS ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...not limited to Information Security, Information Technology, and Internal Audit.<br> ...not limited to Information Security, Information Technology, and Internal Audit should be provided with a quarterly report on the following vulnerability m ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • :'''(2)''' may be based in whole or in part on an audit, evaluation, or report relating to programs or practices of the applicable ...
    4 KB (634 words) - 13:00, 4 June 2010
  • ...found on computer; university's policies and procedures reserved right to audit and monitor Internet use and warned that information flowing through the un ...
    5 KB (741 words) - 18:58, 22 February 2009
  • ...evaluation required by this section may be based in whole or in part on an audit, evaluation, or report relating to programs or practices of the applicable ...
    4 KB (682 words) - 19:17, 3 June 2010
  • Auditing must be activated to record relevant security events. The audit logs must be securely maintained for a reasonable period of time. Specific ...
    5 KB (673 words) - 18:16, 14 January 2014
  • ...imize the effectiveness of and to minimize interference to/from the system audit process. This section provides templates for an Information Security Progra ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...]) is an advanced certification created in 2007 by the Information Systems Audit and Control Association (ISACA). It is designed for experienced professiona *[http://auditmachine.com The IT Audit Machine] ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ::[[Image:Key-control.jpg]][[PCI-12.8.4:|PCI-12.8.4 Audit provisions that ensure that Payment Card Industry representative, or a Paym ...
    7 KB (988 words) - 19:11, 7 July 2006
  • :* Ability to conduct audit coverage of security controls or obtain adequate reports of security testin ...
    6 KB (829 words) - 19:14, 17 April 2007
  • ITIL 4.3 Audit and evaluate security reviews of IT systems.<br> ...
    6 KB (846 words) - 13:52, 4 May 2006
  • * Documentation for EDP audit packages used to detect method of crime ...
    5 KB (816 words) - 15:41, 22 February 2009
  • * PCI-12.8.4 "Audit provisions that ensure that Payment Card Industry representative, or a Paym ...
    7 KB (958 words) - 16:01, 25 June 2006
  • :::K. The system must protect against deletion or alteration of audit records or logs from any source other than a specific program or person int ...periodically reviewed to evaluate the security of the system, and validate audit controls.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • *[[Information technology audit]] *[[Computer security audit]] ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • * Rights to monitor and audit activities<br> ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ...more appropriate for audit and compliance purposes. Keep in mind detailed audit logging grows exponentially. It requires a significant amount of time to ac ...
    20 KB (3,195 words) - 02:47, 23 February 2007
  • ...printouts that contain the information. Periodically, the security staff, audit staff, and data owners should review authorization levels and distribution ...
    9 KB (1,246 words) - 18:20, 10 April 2007
  • * Appropriate audit logs maintained to track changes<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • :15. the right to audit responsibilities defined in the agreement, to have those audits carried out :4. review third party audit trails and records of security events, operational problems, failures, trac ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • * Collection and use of audit trails and similar evidence as part of the incident management and investig ...
    9 KB (1,371 words) - 16:40, 23 May 2007
  • Auditing must be activated to record relevant security events. The audit logs must be securely maintained for a reasonable period of time. Specific ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...additional services, e.g. retransmitting documents, providing third party audit information, acting as a gateway for different transmission methods, and ha ...of all the steps to move business documents between trading partners. The audit ensures that any transaction (which in reality is a business document) can ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • * After selecting appropriate auditing options, you should script the audit, wrap it in a stored procedure,and mark that stored procedure for AutoStart ...
    7 KB (1,018 words) - 13:53, 14 May 2007
  • :* IT audit findings provide insight into the veracity and responsiveness of the instit A successful risk-based IT audit program can be based on an effective scoring system. In establishing a scor ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...rial trends, monitor standards and [[Information_Security_Audit | security audit]] assessment methods and provide suitable liaison points when dealing with ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...diaWiki system to satisfy historical tracking, compliance requirements and audit requirements. ...
    8 KB (1,182 words) - 19:41, 15 January 2014
  • ...or your Next Regulatory Audit | Email and IM Prep for your Next Regulatory Audit]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...w and why of auditing firewalls, including a discussion of policy, design, audit, and tools.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...h Insurance Portability and Accountability Act (HIPAA) Security Rule]. The audit framework is available for purchase to implement it in your own environment ...and responding to security breaches that are identified either during the audit or the normal course of operations.<br> ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...ard, to provide independent oversight of public accounting firms providing audit services ("auditors"). It also creates a central oversight board tasked wi ...eporting requirements. It restricts auditing companies from providing non-audit services (e.g., consulting) for the same clients. ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...osing file paths. The combination of user names and file paths provides an audit trail of previous revisions that may not be desirable. The risk associated ...ts represents a potential privacy breach and can also create an unintended audit trail of authors. User names can be carried with comments, change tracking, ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...ce of funds; disguise the ultimate disposition of the funds; eliminate any audit trail and make it appear as though the funds came through legitimate source ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • * [[Audit_Guidance_Examination_Procedures | Information Technology Audit]] ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • ...stems; and cooperating with the Information Security Department and/or the Audit Department in operational assurance efforts.<br> ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • '''Audit charter''' A document approved by the board of directors that defines the IT audit function's responsibility, authority to review records, and accountability. ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...dards for security related functions (e.g., Authentication, Authorization, Audit). This section covers areas that must be considered as part of the overall ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • * [[Information technology audit]] ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • :* Recording in a secure audit log all significant events performed by the CA system, including the use of :* Periodically audit the access device configurations and patch levels. ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...hird party with access to the centralized database systems. Without proper audit and access controls in place, the threat potential increases. Another examp ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...rol procedures are policies implemented by an entity's board of directors, audit committee, management, and other personnel to provide reasonable assurance ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • virus checking and security audit tools for most computer ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • ...rol procedures are policies implemented by an entity's board of directors, audit committee, management, and other personnel to provide reasonable assurance ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...ncentration account]]s because such accounts do not provide an effective [[audit trail]] for transactions, and this may be used to facilitate money launderi The Secretary of State was ordered to audit and report back to Congress on the Visa waiver program specified under {{us ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...ee id. at 398. The policy stated that the CIA division would "periodically audit, inspect, and/or monitor [each] user's Internet access as deemed appropriat ...hat clerk did not remove public records from her office before a scheduled audit could occur; the resulting search was a "police intrusion" rather than an " ...
    154 KB (23,956 words) - 13:16, 5 August 2011