Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...ctive notification of security violations occurs. If there is suspicion of activity, IT Security would work with the Systems Software group to access to securi Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrati ...
    3 KB (421 words) - 20:20, 12 June 2006
  • ...ctive notification of security violations occurs. If there is suspicion of activity, IT Security would work with the Systems Software group to access to securi Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrati ...
    3 KB (422 words) - 00:09, 13 June 2006
  • ::'''2. Risk: Segregation of duties may be compromised and unauthorized activity may occur.'''<br> ...iately restricted to ensure segregation of duties and prevent unauthorized activity.<br> ...
    3 KB (382 words) - 18:02, 3 May 2006
  • :'''Use a visitor log to retain a physical audit trail of visitor activity. Retain this log for a minimum of three months, unless otherwise restricted Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrati ...
    2 KB (317 words) - 14:19, 2 March 2007
  • ...incident response and monitoring coverage for any evidence of unauthorized activity, critical IDS alerts, and/or reports of unauthorized critical system or con Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrati ...
    2 KB (299 words) - 20:14, 2 March 2007
  • ::'''2. Risk: Segregation of duties may be compromised and unauthorized activity may occur.'''<br> ...iately restricted to ensure segregation of duties and prevent unauthorized activity.<br> ...
    3 KB (362 words) - 23:55, 14 June 2007
  • ...|'''SOX.2.0.26''']] IT security administration monitors and logs security activity at the application and database, and identified security violations are rep Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrati ...
    2 KB (321 words) - 18:06, 25 June 2006
  • <br>Produce reports of service desk activity to enable management to measure service performance and service response ti Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    2 KB (264 words) - 17:42, 5 May 2006
  • 2. Determine if an audit trail exists of all emergency activity and verify that it is independently reviewed. Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrati ...
    3 KB (372 words) - 13:56, 23 June 2006
  • :::b. SOX.4.1.2: Database activity is monitored sufficiently to ensure that the database integrity is maintain :::a. SOX.4.1.5: The database application has the functionality to log user activity and security related events which are reviewed daily by the security admini ...
    4 KB (550 words) - 14:34, 1 May 2006
  • ...the application system is appropriately restricted to prevent unauthorized activity.<br> Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    2 KB (307 words) - 15:06, 3 May 2006
  • ...the application system is appropriately restricted to prevent unauthorized activity.<br> Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    2 KB (330 words) - 18:17, 1 May 2006
  • ...the application system is appropriately restricted to prevent unauthorized activity.<br> Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    3 KB (374 words) - 15:05, 3 May 2006
  • ...the application system is appropriately restricted to prevent unauthorized activity. Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    3 KB (394 words) - 17:12, 22 March 2007
  • ::'''1. Risk: Segregation of duties may be compromised and unauthorized activity may occur.'''<br> ...iately restricted to ensure segregation of duties and prevent unauthorized activity.<br> ...
    4 KB (591 words) - 19:45, 14 June 2007
  • The first activity in the Security Management Process is the “Control” sub-process. The Contro ....1.1 contains the name of the (sub) activity and a short definition of the activity.<br> ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • For each new and ongoing activity, capacity requirements should be identified. System tuning and monitoring s Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    3 KB (490 words) - 13:42, 4 May 2006
  • ...Process]] The SCM process can be generalized as depicted in figure 1. This diagram consists of the six main activities of the SCM process, on which will be el [[Image:SCM_model2.png|left|thumb|300px|Figure 2: Process-data diagram for SCM]] ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ...the application system is appropriately restricted to prevent unauthorized activity.<br> Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...em. Operational procedures should cover shift handover (formal handover of activity, status updates, operational problems, escalation procedures and reports on Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    4 KB (522 words) - 20:12, 25 June 2006
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)