Search results

Jump to navigation Jump to search
  • ...secure all paper and electronic media (e.g., computers, electronic media, networking and communications hardware, telecommunication lines, paper receipts, paper ...erify that the process includes controls for paper and electronic media in computer rooms and data centers, as well as paper receipts, paper reports, faxes, CD ...
    2 KB (318 words) - 14:21, 2 March 2007
  • ...ment. Assets include all elements of [[Computer software|software]] and [[Computer hardware|hardware]] that are found in the business environment. ...nagement of the physical components of computers and [[Computer networking|computer networks]], from acquisition through disposal. Common business practices i ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ::'''2. Risk: Computer equipment may be compromised by accidental damage.''' :::a. [[SOX.2.6.1:|'''SOX.2.6.1''']] Physical storage of computer equipment should be appropriately protected to prevent the risk of accident ...
    5 KB (674 words) - 18:14, 21 June 2006
  • ...located in a user department are often less secure than that located in a computer room. Distributed hardware and software environments (e.g., local area netw ...erform their job. The sensitivity of the data processed or accessed by the computer usually dictates the level of control required. The effectiveness of securi ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • skip-networking<br> ...se from establishing anonymous connections and -- irrespective of the skip-networking parameter in /chroot/mysql/etc/my.cnf -- remote connections as well. ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...ing computer forensic backlog through di... | Divide & conquer: overcoming computer forensic backlog through di...]] ...ial networking for practi... | Legal communities: collaboration and social networking for practi...]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • Part Three: End-users self administering a networked computer 14 This document provides guidance to the end-users of computer systems ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • ...udit_Guidance_Examination_Procedures | Information Technology Audit]] or a computer security audit. However, information security encompasses much more than IT ...rds, locked cages, man traps, single entrances, bolted down equipment, and computer monitoring systems. Additionally, environmental controls should be in place ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...s computer system, or causing electronic messages to be sent from anothers computer system, without express consent, if the relevant system or sender is locate * The collection, use and disclosure of personal information on social networking sites. The OPC has also released decisions and guidance on privacy in the c ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ...he devastating effects that Zeus (or other software like Zeus) can do to a computer and the user. For example, the article stated that programs like Zeus can ...en to people who use somebody else’s photos and information through social networking sites. Mostly, posers create believable stories involving friends of the r ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • Computer programs that offer protection from viruses by making additional checks of An integrated set of computer programs designed to serve a well-defined function and having specific inpu ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ==Computer Fraud and Abuse Act== ...es of malicious interferences with computer systems and to address federal computer offenses, an amendment in 1994 allows civil actions to brought under the st ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...s telephone and cable companies, and some technology companies that supply networking gear, argue telecom providers should have the ability to provide preferenti ...ial of service]] attacks, filtering [[Spam]], and preventing the spread of computer viruses. Quoting Bram Cohen, the creator of [[BitTorrent (protocol)|BitTor ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • # Computer Xpress v. Jackson, 93 Cal. App. 4th 993 (2001). The court ruled that critic ...make unauthorized copies of DVDs on their computers. Having concluded that computer code is “speech” within the meaning of the First Amendment, the court held ...
    32 KB (4,920 words) - 19:22, 10 April 2011