Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • *[[Security engineering]] [[Category:Security]] ...
    1 KB (170 words) - 16:06, 14 June 2007
  • ==Sources of standards for Information Security== ...n Security Management System]]s" are of particular interest to information security professionals.<br> ...
    2 KB (287 words) - 14:29, 8 March 2007
  • ==Sample Employee Ongoing Security Awareness Standard== ...and provides specific instructions and requirements for providing ongoing security awareness education and training for Company employees. ...
    2 KB (275 words) - 17:10, 23 January 2014
  • '''Secure by design''', in software engineering, means that the program in question has been designed from the ground up to ...years of testing and debugging, and while they may provide a great deal of security, they typically have no way to guarantee that a new bug or exploit won't be ...
    2 KB (343 words) - 18:39, 14 June 2007
  • ==Physical and Environmental Security== '''Physical security''' describes measures that prevent or deter attackers from accessing a faci ...
    4 KB (592 words) - 19:28, 14 June 2007
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> ...> to gauge and promote end-user awareness of managing risk with the use of security processes.<br> ...
    2 KB (309 words) - 17:34, 3 August 2006
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> ...> to gauge and promote end-user awareness of managing risk with the use of security processes.<br> ...
    2 KB (305 words) - 17:31, 3 August 2006
  • ...ver authorization, authentication, nonrepudiation, data classification and security monitoring may result in inaccurate financial reporting.''' 1. Determine the sufficiency and appropriateness of perimeter security controls, including firewalls and intrusion detection systems. ...
    3 KB (360 words) - 17:03, 9 April 2007
  • ==Personnel Security== ...rs grant legitimate users system access necessary to perform their duties; security personnel enforce access rights in accordance with institution standards. B ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • :'''Avoid Session Management Pitfalls:''' [[Media:session-management-security.pdf]]<br> ...Configuration Management for Security:''' [[Media:configuration-management-security.pdf]] <br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ...ecurity]] which in turn grew out of practices and procedures of [[computer security]]. ...ter science. Therefore, IA is best thought of as a superset of information security. ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...tackers are unlikely to find them. The technique stands in contrast with [[security by design]], although many real-world projects include elements of both str ...aphy was disturbing to the US government, which seems to have been using a security through obscurity analysis to support its opposition to such work. ...
    11 KB (1,798 words) - 14:44, 14 June 2007
  • :* [[Engineering Practices]] ...ount management]], [[fault management]], [[performance management]], and [[security management]].<br> ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ::*Threat mechanisms including but not limited to social engineering, virus, denial of service, etc.<br> ...hreat assessment activities should be integrated, as appropriate, into the Security Awareness Program.<br> ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • ...s used in many applications encountered in everyday life; examples include security of automated teller machine cards, computer passwords, and electronic comme ...ccessive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and m ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • ...0.14:| '''SOX.2.0.14''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contrac :::f. [[SOX.2.0.16:| '''SOX.2.0.16''']] A regular review of security, availability and processing integrity is performed by third-party service ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...h only peripherally addressed BCP to improve an organization's information security procedures. BS 25999's applicability extends to all organizations. In 2007, * Hacker (computer security)|Cyber attack ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...c Operational Readiness Security Evaluation is a comprehensive information security framework designed to be accessible, extensible, comprehensive, and collabo ...| COBIT]]) is another approach to standardize good information technology security and control practices. This is done by providing tools to assess and measu ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...orms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, form ...h Cir. 1991). The owner of the trade secret must, however, take reasonable security measures when it does disclose the information, such as requiring non-discl ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • '''Vishing''' is the criminal practice of using social engineering over the telephone system to gain access to private personal and financial ...hing attacks to the Company email address that is monitored by Information Security Incident Response team members. This email address is: abuse@yourcompany.co ...
    14 KB (2,165 words) - 16:53, 22 September 2009
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)