Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • =='''Technical Standards Guides'''== ...iled descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirement ...
    4 KB (512 words) - 12:05, 25 July 2006
  • 3 KB (363 words) - 11:45, 29 August 2006
  • =='''Technical Standards Guides'''== ...iled descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirement ...
    5 KB (597 words) - 15:27, 16 November 2006
  • ==Sources of standards for Information Security== ...d that coordinates the system. The ISO is the world's largest developer of standards. The ISO-15443: "Information technology - Security techniques - A framewor ...
    2 KB (287 words) - 14:29, 8 March 2007
  • 4 KB (644 words) - 14:43, 15 May 2007
  • ...sset Management Standard''']] defines objectives for establishing specific standards for properly managing the Company Information Technology infrastructure, in ...s for establishing and maintaining legal evidence retention and protection standards for Company physical and electronic data stores, network devices, servers, ...
    9 KB (1,213 words) - 13:20, 9 March 2009
  • =='''Oracle Database Asset Protection Standards:'''== It is recommended that the accepted standards developed by the company be applied to the default profile to eliminate any ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...and business processes depend, requires a consistent approach to security standards in the areas of database configurations, maintenance, and administration. I * Access standards ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • 7 KB (1,018 words) - 13:53, 14 May 2007

Page text matches

  • =='''Technical Standards Guides'''== ...iled descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirement ...
    5 KB (597 words) - 15:27, 16 November 2006
  • =='''Technical Standards Guides'''== ...iled descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirement ...
    4 KB (512 words) - 12:05, 25 July 2006
  • ==Sources of standards for Information Security== ...d that coordinates the system. The ISO is the world's largest developer of standards. The ISO-15443: "Information technology - Security techniques - A framewor ...
    2 KB (287 words) - 14:29, 8 March 2007
  • ...ards for Privacy of Individually Identifiable Health Information, Security Standards for the Protection of Electronic Protected Health Information, and General ...
    400 bytes (47 words) - 13:15, 15 June 2007
  • ...1.3:]], [[PCI-1.1.4:]], [[PCI-1.1.5:]], and [[PCI-1.1.6:]], to verify that standards are complete. ...
    242 bytes (27 words) - 12:18, 16 June 2010
  • ...Information Security Policy Framework templates (for example, policies and standards) that are needed to create, implement, and maintain a risk management-based ...ion Security Policy templates (for example, Program Charter, policies, and standards) that are needed to create, implement, and maintain an Information Security ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ...s from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain an Information ...le Policy Framework templates (for example, Program Charter, policies, and standards) that are needed to create, implement, and maintain an Information Security ...
    2 KB (260 words) - 13:17, 15 June 2007
  • :'''Establish firewall configuration standards that include:'''<br> ...n standards and other documentation specified below to obtain evidence the standards are complete. Also obtain a copy of the following documentation: ...
    2 KB (278 words) - 21:22, 2 March 2007
  • ...nology Security Policy define Company objectives for establishing specific standards on the protection of the confidentiality, integrity, and availability of Co ...c perspective that must be addressed in the subordinate control documents; standards, procedures, and supporting documentation are described as follows.<br> ...
    4 KB (465 words) - 15:46, 13 January 2014
  • :'''Establish firewall configuration standards that include:'''<br> ...n standards and other documentation specified below to obtain evidence the standards are complete. Also obtain a copy of the following documentation: ...
    2 KB (290 words) - 21:22, 2 March 2007
  • :'''Establish firewall configuration standards that include:'''<br> ...n standards and other documentation specified below to obtain evidence the standards are complete. Also obtain a copy of the following documentation: ...
    2 KB (315 words) - 21:21, 2 March 2007
  • :::a. [[SOX.2.0.18:|'''SOX.2.0.18''']] A framework of security standards has been developed that supports the objectives of the security policy. Obtain a copy of the security standards and: ...
    3 KB (360 words) - 16:59, 25 June 2006
  • ...tion provides sample Policy Framework templates (for example, policies and standards) that are needed to create, implement, and maintain an Information Security ...ty Program that complies with GLBA. Additional best practices policies and standards are provided for financial organizations that wish to exceed GLBA requireme ...
    2 KB (263 words) - 12:52, 14 July 2006
  • '''BS 7799''' was a standard originally published by British Standards Institution (BSI) in 1995. It was written by the United Kingdom Government' ...n revised in June 2005 and finally incorporated in the ISO 27000 series of standards as [[ISO/IEC 27002]] in July 2007. ...
    2 KB (249 words) - 10:56, 27 October 2012
  • :[[Information_Security_Standards_Sources:|'''Sources of Information Security Standards''']]<br> ...to some international sites that provide many of the information security standards we should be familiar with.<br> ...
    1,015 bytes (132 words) - 14:09, 8 March 2007
  • :'''(1)''' promulgating information security standards under section 11331 of title 40;<br> :'''(2)''' overseeing the implementation of policies, principles, standards, and guidelines on information security;<br> ...
    3 KB (414 words) - 11:45, 4 June 2010
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...quired for each system ID. Password configuration is based on Corporate IT standards.<br> ...
    3 KB (405 words) - 00:10, 13 June 2006
  • ...ion and Classification Policy defines objectives for establishing specific standards to define, identify, classify, and label information assets.<br> :The Asset Protection Policy defines objectives for establishing specific standards for providing an appropriate degree of confidentiality, integrity, and avai ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...chnology (NIST, At the time named National Bureau of Standards) to develop standards of minimum acceptable practices with the help of the National Security Agen ...
    1 KB (168 words) - 11:37, 23 May 2010
  • ...on of the Information Security Program Charter and associated policies and standards.<br> ...ion security awareness training for management should cover all topics and standards for employees or Users, as well as the following policies:<br> ...
    5 KB (662 words) - 17:54, 25 July 2006
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)