Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ..., people skills and competencies, organization structure, and the enabling technology. ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...software, facilities, technology, and user procedures) and ensure that the information security requirements are met by all components. The test data should be sa Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • Ensure that IT management, working with the business, defines a balanced set of performance objective * Future-oriented activities, for example, emerging technology, reusable infrastructure, business and IT personnel skill sets.<br> ...
    3 KB (362 words) - 12:33, 4 May 2006
  • '''DS 11.3 Media Library Management System '''<br> ...r [[AES | Advanced Encryption Standard]] (AES) 256-bit with associated key management processes and procedures.''' ...
    3 KB (401 words) - 11:50, 28 March 2008
  • ...t considers changes in the competitive environment, economies of scale for information systems staffing and investments, and improved interoperability of platform Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (351 words) - 17:03, 21 June 2006
  • [[Category:Information technology management|Governance]] [[Category:Information technology governance| ]] ...
    2 KB (235 words) - 09:48, 23 October 2012
  • '''(a)''' In General.— The Director shall oversee agency information security policies and practices, including—<br> ...g the implementation of policies, principles, standards, and guidelines on information security, including through ensuring timely agency adoption of and complian ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ...shed procedures across the organization to protect information systems and technology from computer viruses. ...
    2 KB (279 words) - 19:02, 25 June 2006
  • ...ation of the costs of delivering IT capabilities and services. Ensure that technology investments are standardized to the greatest extent possible to avoid the i Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    3 KB (393 words) - 14:35, 21 June 2006
  • ...anagement procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requ ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...ormation requirements, IT configuration, information risk action plans and information security culture into an overall IT security plan. The plan is implemented ...y policy exists and has been approved by an appropriate level of executive management. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ==FFIEC Information Technology Examination Handbook Executive Summary== ...ve effort of the FFIEC’s five member agencies, has replaced the 1996 FFIEC Information Systems Examination Handbook (1996 Handbook). ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...1)''' The term '''information security''' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification ...st improper information modification or destruction, and includes ensuring information non-repudiation and authenticity; ...
    2 KB (327 words) - 00:58, 1 June 2010
  • ...financial resources expended by persons to generate, maintain, or provide information to or for a Federal agency, including the resources expended for—<br> :'''(B)''' acquiring, installing, and utilizing technology and systems; ...
    5 KB (795 words) - 00:35, 1 June 2010
  • ...bility to identify, acquire, install, and maintain appropriate information technology systems.” The process includes the internal development of software applic ...o deliver products or services, maintain a competitive position, or manage information.<br> ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • =='''Vulnerability Management Standard'''== ...jectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • '''Federal Information Security Management Act (FISMA)''' ...the implementation of and compliance with the Federal Information Security Management Act including: ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ...hanges to business processes, technology and skills are assessed. Business management, supported by the IT function, should assess the feasibility and alternativ Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (357 words) - 14:15, 3 May 2006
  • ...igence Directives.''' Protecting Special Access Program Information Within Information Systems policy excerpt: [[Media:JAFAN_6_3.pdf]]<br> :'''Avoid Session Management Pitfalls:''' [[Media:session-management-security.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • == Requirement 12: Maintain a policy that addresses information security. == ::[[Image:Key-control.jpg]][[PCI-12.3.1:|PCI-12.3.1 Explicit management approval.]]<br> ...
    7 KB (988 words) - 19:11, 7 July 2006
View ( | ) (20 | 50 | 100 | 250 | 500)