Search results

Jump to navigation Jump to search
  • ...d to the insurance company's IS managers. The examiners recognize the wide variation in the size (e.g., large mainframe vs. small network) and structure (e.g., ...0 and the company operates 7 financially significant applications within a common control infrastructure whereby only one IS questionnaire has been completed ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • * a common language and a shared vision ...parative assessment of different organizations where there is something in common that can be used as a basis for comparison. In the case of the CMM, for exa ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...to identify potential risks. Risks are about events that, when triggered, cause problems. Hence, risk identification can start with the source of problems, ...or the development of templates for identifying source, problem or event. Common risk identification methods are: ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...merchant during a legitimate transaction. The compromise can occur by many common routes and can usually be conducted without tipping off the card holder, th ...companies. Self-serve payment systems (pay at the pump, kiosks, etc.) are common targets for stolen cards, as there is no way to verify the card holder's id ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...ft'', in which identities are completely or partially fabricated. The most common technique involves combining a real social security number with a name and ...’t discover the problem until years later. Child identity theft is fairly common, and studies have shown that the problem is growing. The largest study on c ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...parency policy which misleads executives to treat the symptoms and not the cause.'<br> *'''Balance of power''': The simplest balance of power is very common; require that the President be a different person from the Treasurer. This ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • Passwords are the most common authentication mechanism. Passwords are generally made difficult to guess :* A dictionary attack is one common and successful way to discover passwords. In a dictionary attack, the atta ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...parency policy which misleads executives to treat the symptoms and not the cause.' *'''Balance of power''': The simplest balance of power is very common; require that the President be a different person from the Treasurer. This ...
    45 KB (6,604 words) - 15:20, 15 April 2010