Search results

Jump to navigation Jump to search
  • '''AI 6.2 Impact Assessment, Prioritization and Authorization'''<br> ...ured way for impacts on the operational system and its functionality. This assessment should include categorization and prioritization of changes. Prior to migra ...
    2 KB (346 words) - 20:00, 23 June 2006
  • [[ME1.4:| 1.4 Performance Assessment]]<br> [[ME2.4:| 2.4 Control Self-assessment]]<br> ...
    2 KB (195 words) - 19:06, 14 June 2007
  • '''PO 9.4 Risk Assessment'''<br> ...fied risks, using qualitative and quantitative methods. The likelihood and impact associated with inherent and residual risk should be determined individuall ...
    2 KB (304 words) - 20:21, 1 May 2006
  • ...fundamental process in quality control. It is also formally used where the impact of a change could have severe [[Risk_management | risk]] and or financial c ...request, and decides upon who should make an '''IMPACT ASSESSMENT'''. The IMPACT ASSESSOR or ASSESSORS then make their risk analysis and make a judgment on ...
    3 KB (533 words) - 14:15, 23 April 2010
  • =='''Sample Threat Assessment Standard'''== ...Policy''']] defines objectives for establishing specific standards on the assessment and ongoing monitoring of threats to Company information assets.<br> ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • ...Security Evaluation - Comprehensive information security control and risk assessment guidance for the enterprise demystified. This presentation was offered at t ...f wireless local area networks (WLANs), the main features of WLANs, common assessment tools, and network architecture best practices for improving wireless secur ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...lity exposures that may permit unauthorized access to systems and data and impact financial reporting. .'''<br> :::a. [[SOX.2.0.32:|'''SOX.2.0.32''']] Periodic testing and assessment is performed to confirm that the software and network infrastructure is app ...
    2 KB (288 words) - 18:53, 25 June 2006
  • 1. Determine that a risk assessment of the potential impact of changes to system software is performed. ...
    2 KB (303 words) - 19:58, 23 June 2006
  • IT controls result from an effective, risk assessment process. Therefore, the ability to mitigate IT risks is dependent upon risk :* An ongoing risk assessment process that evaluates the environment and potential changes ...
    4 KB (528 words) - 16:58, 28 March 2010
  • ...lity exposures that may permit unauthorized access to systems and data and impact financial reporting ...lity exposures that may permit unauthorized access to systems and data and impact financial reporting. .'''<br> ...
    3 KB (429 words) - 18:55, 25 June 2006
  • =='''Vulnerability Assessment Standard'''== ...Policy''']] defines objectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • * A risk assessment that addresses likely causes and consequences of information system failure ===Business continuity and risk assessment=== ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ...t are likely to affect them. The Service Desk is in the direct line of any impact on the Service Level Agreement (SLA) and as such should be kept rapidly inf ...tating the restoration of normal operational service with minimal business impact on the customer within agreed levels SLA and business priorities. ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ...ancial reporting objectives. Deficiencies in this area could significantly impact financial reporting. For instance, changes to the programs that allocate fi ...or program changes may not meet all control requirements or may negatively impact existing processing.'''<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • '''PO 1.3 Assessment of Current Performance'''<br> ...of logging required for individual systems should be determined by a risk assessment, taking performance degradation into account.<br> ...
    4 KB (586 words) - 01:37, 1 May 2006
  • '''Risk assessment''' is a step in the [[risk management]] process. Risk assessment is [[measurement|measuring]] two quantities of the [[risk]] ''R'', the magn Risk assessment may be the most important step in the risk management process, and may also ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • ...cost to the asset's stakeholders. The sum of the products of the threats' impact and the probability of their occurring is the total risk to the information With the risk assessment complete, the IA practitioner then develops a [[Risk Management Plan|risk m ...
    7 KB (983 words) - 10:41, 15 April 2012
  • * Specifications based on a thorough risk assessment, that considers appropriate algorithm selections, key management and other * A risk assessment, analysis of actual and potential impacts of changes, and specification of ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...ess needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requirements.<br> ::'''2. Risk: The impact of application system changes (e.g., hardware and software) should be evalu ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...dance with the defined acceptance plan and based on an impact and resource assessment that includes performance sizing in a separate test environment by an indep ...
    3 KB (497 words) - 14:57, 23 June 2006
  • ...Policy''']] defines objectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...le Vulnerability Assessment and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']], and provides specific instructions and requirem ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • ::'''(B)''' an assessment of the development, promulgation, and adoption of, and compliance with, sta ...isruption, modification, or destruction of which would have a debilitating impact on the mission of the Department of Defense.<br> ...
    4 KB (671 words) - 10:44, 1 June 2010
  • :* Impact of IT - The steering committee should understand the relationship between t ...agement Policy, Vulnerability Assessment and Management Policy, and Threat Assessment and Monitoring Policy.<br> ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...blished in the [[Sample_Threat_Assessment_and_Monitoring_Policy:|'''Threat Assessment and Monitoring Standard''']], and provides specific requirements for develo ...tments as necessary to coordinate, in advance, responses that may directly impact those departments. ...
    5 KB (737 words) - 15:24, 21 January 2014
  • * Standards for categorizing information and information systems by mission impact. ...ducts and services used in security control implementation. The security assessment services will determine the extent to which the security controls are imple ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • [[AI6.2:| 6.2 Impact Assessment, Prioritization and Authorization]]<br> ...
    3 KB (341 words) - 19:07, 14 June 2007
  • ...Policy''']] defines objectives for establishing specific standards on the assessment and ongoing monitoring of threats to Company information assets.<br> ...in the [[Sample Threat Assessment and Monitoring Policy:|'''Sample Threat Assessment and Monitoring Policy''']], and provides specific instructions and requirem ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • :* Business impact analysis (BIA) :* Risk assessment ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ...uidelines''' defines objectives for establishing specific standards on the assessment and ongoing management of wireless technologies utilized for the extension ...sk is present if a threat can exploit an actual vulnerability to adversely impact a sensitive information asset.<br> ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ...nts assessment: ibm db2 records manager and r... | Compliance requirements assessment: ibm db2 records manager and r...]] #[[E-billing in Europe and the Impact of VAT | E-billing in Europe and the Impact of VAT]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...hannels, should carefully consider customer expectations and the potential impact of service disruptions on customer satisfaction and loyalty.<br> ...should determine the appropriate level of security controls based on their assessment of the sensitivity of the information to the customer and to the institutio ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...bility of that event as the Single Loss Expectancy (SLE) and the resulting impact of the occurrence, otherwise known as the Annualized Loss Expectancy (ALE) ...following list provides a brief description of each security goal and the impact of its not being met:<br> ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ::*Impact on production environment<br> <tr><td>'''Critical'''</td><td>Severe business or production impact, if not implemented immediately.<br> <br>Mandatory and must be implemented. ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...cations and related systems. Deficiencies in this area could significantly impact financial reporting and disclosure of an entity. For instance, insufficient ...nformation processing facilities or information of an organization, a risk assessment (see also Section 4) should be carried out to identify any requirements for ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ...ion and security monitoring. Deficiencies in this area could significantly impact financial reporting. For instance, insufficient controls over transaction a ...that identifies threats, and vulnerabilities, and results in a formal risk assessment. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ...tion of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities. Risk Please refer to [[Risk_Assessment_and_Treatment: | Risk Assessment and Treatment]] for additional information pertaining to enterprise risk ma ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...essments within the functional risk management areas. An effective IT risk assessment process will improve policy and internal controls decisions across the orga ...all institutions with less complex systems may have a more simplified risk assessment process. Regardless of the complexity, the process should be formal and sho ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • =='''Vulnerability Assessment'''== ...ctivity web page is a regularly updated summary of the most frequent, high-impact types of security incidents currently being reported to the US-CERT.<br> ...
    8 KB (1,058 words) - 12:30, 5 August 2011
  • ...n Guidelines defines objectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...sk is present if a threat can exploit an actual vulnerability to adversely impact a sensitive information asset.<br> ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • To minimize the impact of cascading vulnerabilities, keep your systems up-to-date with security pa ===<font color=maroon>'''The performance impact of encryption'''</font>=== ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...ssues such as auditor independence, corporate governance, internal control assessment, and enhanced financial disclosure. ...es in conclusions. This is due in part to the difficulty of isolating the impact of SOX from other variables affecting the stock market and corporate earnin ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...agent problem. A related but separate thread of discussions focuses on the impact of a corporate governance system in economic efficiency, with a strong emph ===Impact of Corporate Governance=== ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ::* Institution’s overall risk assessment ::* Institution’s risk assessment ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...agent problem. A related but separate thread of discussions focuses on the impact of a corporate governance system in economic efficiency, with a strong emph ...s highlighted in a 1989 article by Kathleen Eisenhardt ("Agency theory: an assessment and review", Academy of Management Review). ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...cations and related systems. Deficiencies in this area could significantly impact financial reporting and disclosure of an entity. For instance, insufficient ...efore selection, potential third parties are properly qualified through an assessment of their capability to deliver the required service and a review of their f ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...o the system, and monitoring of token delivery and use. Additionally, the impact of token theft is reduced when the token is used in multi-factor authentica ...lection and the firewall policy should stem from the ongoing security risk assessment process. Accordingly, management needs to update the firewall policy as th ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • '''Business Impact Analysis (BIA)''' The process of identifying the potential impact of uncontrolled, non-specific events on an institution's business processes ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...he legislation by section, explaining both the changes and their potential impact with respect to: enhanced surveillance procedures;money laundering and fina ...m C. "The Impact of USA Patriot Act on American Society: An Evidence Based Assessment" (N.Y.: Nova Press, 2007) (In print) ...
    142 KB (21,198 words) - 10:23, 23 August 2011