Search results

Jump to navigation Jump to search
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)
  • ...is also the responsibility of Release Management. This guarantees that all software can be conceptually optimized to meet the demands of the business processes *Plan to rollout of software ...
    2 KB (352 words) - 16:42, 20 March 2007
  • ...are fixed via vendor security patches, and all systems should have current software patches to protect against exploitation by employees, external hackers, and ...re that all system components and software have the latest vendor-supplied security patches.'''<br> ...
    4 KB (578 words) - 18:46, 28 February 2007
  • '''Secure by design''', in software engineering, means that the program in question has been designed from the ...years of testing and debugging, and while they may provide a great deal of security, they typically have no way to guarantee that a new bug or exploit won't be ...
    2 KB (343 words) - 18:39, 14 June 2007
  • ...also create risk that can be in the form of more rework than anticipated, security holes, and privacy invasions (Messerschmitt and Szyperski, 2004).<br> ...the potential customer base, specialization risk can be significant for a software firm. After probabilities of scenarios have been calculated with risk analy ...
    1 KB (215 words) - 18:32, 13 April 2007
  • ...Unix and Linux systems. This may involve, among other measures, applying a software patch to the kernel such as Exec Shield or PaX; closing open TCP and UDP po *[[Computer security]] ...
    1 KB (168 words) - 18:26, 14 June 2007
  • ...ver authorization, authentication, nonrepudiation, data classification and security monitoring may result in inaccurate financial reporting.''' ...security standards has been developed that supports the objectives of the security policy. ...
    3 KB (360 words) - 16:59, 25 June 2006
  • ...'']] IT management implements system software that does not jeopardize the security of the data and programs being stored on the system. ...ermine that a risk assessment of the potential impact of changes to system software is performed. ...
    2 KB (303 words) - 19:58, 23 June 2006
  • ...de a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support Federal operations and ass ...dination of information security efforts throughout the civilian, national security, and law enforcement communities;<br> ...
    1 KB (192 words) - 10:33, 1 June 2010
  • ...de a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support Federal operations and ass ...dination of information security efforts throughout the civilian, national security, and law enforcement communities;<br> ...
    1 KB (192 words) - 10:36, 1 June 2010
  • ::'''2. Risk: Insufficient configuration controls can lead to security and availability exposures that may permit unauthorized access to systems a :::a. [[SOX.2.0.29:|'''SOX.2.0.29''']] Only authorized software is permitted for use by employees using company IT assets.<br> ...
    2 KB (314 words) - 18:27, 25 June 2006
  • ...hich are used to access the organization’s network, have personal firewall software installed and active.'''<br> ...oint firewall and security software configurations to verify that security software standards are acceptable and that updates are current prior to authorizing ...
    2 KB (296 words) - 10:57, 16 June 2010
  • ...lopment processes to confirm they are based on industry standards and that security is included throughout the life cycle.<br> :From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (298 words) - 18:26, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (297 words) - 18:33, 28 February 2007
  • '''10. Risk: Reactive security monitoring results in data compromise and financial loss or liability.'''<b :a. SOX.4.2.1.10: UNIX administration team is notified when security violations occur.<br> ...
    3 KB (421 words) - 20:20, 12 June 2006
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (304 words) - 18:36, 28 February 2007
  • '''Zero day''' in technology refers to software, videos, music, or information unlawfully released or obtained on the day o ===Software=== ...
    4 KB (570 words) - 19:02, 14 June 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (307 words) - 18:29, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (304 words) - 18:28, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (316 words) - 18:30, 28 February 2007
  • '''AI 2.10 Application Software Maintenance'''<br> ...ort issues and upgrades, periodic review against business needs, risks and security requirements.<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...ist of security patches installed on each system to the most recent vendor security patch list, to determine that current vendor patches are installed.<br> ...ch installation to determine they require installation of all relevant new security patches within 30 days.<br> ...
    2 KB (295 words) - 18:20, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (334 words) - 18:37, 28 February 2007
  • == Requirement 11: Regularly test security systems and processes. == ...tems, processes, and custom software should be tested frequently to ensure security is maintained over time and through changes. ...
    3 KB (372 words) - 17:59, 7 July 2006
  • '''DS 5.7 Protection of Security Technology '''<br> ...ow profile. However, do not make security of systems reliant on secrecy of security specifications. ...
    3 KB (377 words) - 18:52, 4 May 2006
  • ::'''1. Risk: Insufficient configuration controls can lead to security and availability exposures that may permit unauthorized access to systems a ...0.32''']] Periodic testing and assessment is performed to confirm that the software and network infrastructure is appropriately configured. ...
    2 KB (288 words) - 18:53, 25 June 2006
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> ...> to gauge and promote end-user awareness of managing risk with the use of security processes.<br> ...
    2 KB (305 words) - 17:31, 3 August 2006
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> ...> to gauge and promote end-user awareness of managing risk with the use of security processes.<br> ...
    2 KB (309 words) - 17:34, 3 August 2006
  • What are assets? Asset Management from a corporate governance and information security perspective is not just about 'IT' Assets. It is about the management, cont ...is taken from and attributable to UK-National Health Services Information Security it I believe adequately covers what we can do/do with data. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...otification message produced by the system being tested to verify that the security administrators are being proactively notified of possible access violations ...be a monitoring background process that sends an electronic message to the security administrative group automatically when root access occurs. The email messa ...
    3 KB (422 words) - 00:09, 13 June 2006
  • '''AI 2.4 Application Security and Availability'''<br> ...ed risks, in line with data classification, the organization’s information security architecture and risk profile. Issues to consider include access rights and ...
    3 KB (374 words) - 15:05, 3 May 2006
  • Controls provide reasonable assurance that IT components, as they relate to security, processing and availability, are well protected, would prevent any unautho :5. Prevent the inclusion of unauthorized software ...
    3 KB (429 words) - 18:55, 25 June 2006
  • ...cilities, technology, and user procedures) and ensure that the information security requirements are met by all components. The test data should be saved for a ISO 17799 12.1 Security requirements of information systems.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • '''AI 2.5 Configuration and Implementation of Acquired Application Software'''<br> Controls provide reasonable assurance that IT components, as they relate to security, processing and availability, are well protected, would prevent any unautho ...
    4 KB (501 words) - 18:24, 25 June 2006
  • ...controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> :*'''[[Security Policy:|'''Security Policy''']]<br> ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...h management and upgrade strategies, risks, vulnerabilities assessment and security requirements.<br> ::'''2. Risk: The impact of application system changes (e.g., hardware and software) should be evaluated and adjusted to ensure ongoing availability, performan ...
    6 KB (819 words) - 13:54, 23 June 2006
  • =='''Sample Software Acceptable Use Standard'''== ...ons and requirements on the proper and appropriate business use of Company software.<br> ...
    7 KB (953 words) - 14:13, 1 May 2010
  • '''PO 4.8 Responsibility for Risk, Security and Compliance'''<br> ...es may need to be assigned at a system-specific level to deal with related security issues. Obtain direction from senior management on the appetite for IT risk ...
    3 KB (370 words) - 18:04, 1 May 2006
  • '''DS 5.9 Malicious Software Prevention, Detection and Correction '''<br> ...m malware (viruses, worms, spy-ware, spam, internally developed fraudulent software, etc.). ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ==Security Audit Guidance== For security audit guidance, please refer to [[Audit_Guidance_Examination_Procedures | A ...
    5 KB (665 words) - 14:40, 11 April 2007
  • ==Security requirements of information systems== The objective of this category is to ensure that security is an integral part of the organization's information systems, and of the b ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ==Personnel Security== ...rs grant legitimate users system access necessary to perform their duties; security personnel enforce access rights in accordance with institution standards. B ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • Controls provide reasonable assurance that IT components, as they relate to security, processing and availability, are well protected, would prevent any unautho ...ion on configuration items. This repository includes hardware, application software, middleware, parameters, documentation, procedures and tools for operating, ...
    4 KB (506 words) - 18:44, 25 June 2006
  • :'''Verify that the personal firewall software is configured by the organization to specific standards and is not alterabl :* Examine associated endpoint firewall and security software configurations to verify that administration is restricted only authorized ...
    2 KB (267 words) - 10:51, 16 June 2010
  • The objective of this category is to manage information security within the organization's overall administrative structure.<br> ===Management commitment to information security=== ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ...ropriate into related groups or domains (e.g., hardware, software, support software). These groups may match the organizational responsibilities or the user an ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...
    4 KB (601 words) - 15:01, 8 August 2006
  • ==Laws and regulations governing Information Security== ...have also been included when they have a significant impact on information security. ...
    4 KB (556 words) - 14:03, 8 March 2007
  • '''DS 11.6 Security Requirements for Data Management '''<br> Establish arrangements to identify and apply security requirements applicable to the receipt, processing, physical storage and ou ...
    5 KB (649 words) - 18:23, 5 May 2006
  • :'''Avoid Session Management Pitfalls:''' [[Media:session-management-security.pdf]]<br> ...Configuration Management for Security:''' [[Media:configuration-management-security.pdf]] <br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ...t Protection Standard, Company protection standards shall include specific security requirements in the following areas: ## Sample Protection Standards must be reviewed by the Information Security Department to ensure vulnerabilities are not introduced into the Company pr ...
    5 KB (681 words) - 21:56, 15 January 2014
  • ...any change-control procedures related to implementing security patches and software modifications, and determine the procedures required.'''<br> ...ct a sample of system components and find the three most recent changes or security patches for each system component, and trace those changes back to related ...
    2 KB (307 words) - 18:42, 28 February 2007
  • ...any change-control procedures related to implementing security patches and software modifications, and determine the procedures required.'''<br> ...ct a sample of system components and find the three most recent changes or security patches for each system component, and trace those changes back to related ...
    2 KB (304 words) - 18:44, 28 February 2007
  • ...any change-control procedures related to implementing security patches and software modifications, and determine the procedures required.'''<br> ...ct a sample of system components and find the three most recent changes or security patches for each system component, and trace those changes back to related ...
    2 KB (307 words) - 18:43, 28 February 2007
  • ...any change-control procedures related to implementing security patches and software modifications, and determine the procedures required.'''<br> ...ct a sample of system components and find the three most recent changes or security patches for each system component, and trace those changes back to related ...
    2 KB (311 words) - 18:42, 28 February 2007
  • '''AI 7.9 Software Release'''<br> Ensure that the release of software is governed by formal procedures ensuring sign-off, packaging, regression t ...
    2 KB (296 words) - 17:59, 3 May 2006
  • ...guration management software is available. When a system needs hardware or software upgrade, a computer technician can access the configuration management prog ...lopment, is called [[Software Configuration Management]] (SCM). Using SCM, software developers can keep track of the source code, documentation, problems, chan ...
    7 KB (942 words) - 15:09, 23 March 2007
  • [[DS5:| '''5 Ensure Systems Security''']]<br> [[DS5.1:| 5.1 Management of IT Security]]<br> ...
    4 KB (538 words) - 19:08, 14 June 2007
  • [[AI2:| '''2 Acquire and Maintain Application Software''']]<br> [[AI2.4:| 2.4 Application Security and Availability]]<br> ...
    3 KB (341 words) - 19:07, 14 June 2007
  • '''AI 5.4 Software Acquisition'''<br> ..., arbitration procedures, upgrade terms, and fitness for purpose including security, escrow and access rights.<br> ...
    3 KB (428 words) - 14:05, 23 June 2006
  • :2. Corporate values (ethical values, control and security culture, etc.) :3. Implementation of new IT infrastructure and software (packages and applications) ...
    2 KB (333 words) - 16:42, 5 May 2006
  • Kutten, Computer Software: Protection, Liability, Law, Forms § 4.051. ...Center for Computer Crime Data (Los Angels 1985); Computer Crime, Computer Security, Computer Ethics (The first annual statistical report), J BloomBecker, ed., ...
    865 bytes (127 words) - 10:50, 25 February 2009
  • ...system software and data. This section provides templates for Information Security standards that are required to comply with ISO Systems Development and Main ...s for life cycle management of information systems, including hardware and software.<br> ...
    5 KB (613 words) - 18:14, 25 July 2006
  • ...approved and licensed anti-virus or virus detection software packages. The software packages are listed in the system of record. ## Company-approved anti-virus software must be installed on all Company servers and client workstations. ...
    5 KB (765 words) - 20:00, 15 January 2014
  • ...configuration, integration and maintenance of hardware and infrastructural software to protect resources and ensure availability and integrity. Responsibilitie ...
    1 KB (146 words) - 17:19, 7 June 2006
  • ...is scheme includes details about data ownership, definition of appropriate security levels and protection controls, and a brief description of data retention a ISO 17799 4.1 Information security infrastructure.<br> ...
    3 KB (363 words) - 16:53, 9 April 2007
  • =='''Sample Third Party Security Awareness Standard'''== ...f the [[Sample Information Security Program Charter:|'''Sample Information Security Program Charter''']] and associated policies and standards.<br> ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • '''AI 2.7 Development of Application Software'''<br> ...legal and contractual aspects are identified and addressed for application software developed by third parties.<br> ...
    6 KB (804 words) - 12:14, 23 June 2006
  • ITIL 7. Supplier Relationship Management Software Asset Management, Organization, Roles and Responsibilities.<br> ITIL 4.1 Decision about centralization Software Asset Management.<br> ...
    3 KB (356 words) - 17:11, 1 May 2006
  • ...ogram changes, system changes and maintenance (including changes to system software) is standardized, logged, approved, documented and subject to formal change ::2.) security, ...
    3 KB (447 words) - 13:36, 23 June 2006
  • ...op and maintain a risk response to ensure that cost-effective controls and security measures mitigate exposure to risks on a continuing basis. The risk respons ISO 17799 12.1 Objective: To ensure that security is an integral part of information systems.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...tackers are unlikely to find them. The technique stands in contrast with [[security by design]], although many real-world projects include elements of both str ...aphy was disturbing to the US government, which seems to have been using a security through obscurity analysis to support its opposition to such work. ...
    11 KB (1,798 words) - 14:44, 14 June 2007
  • =='''Logical Security'''== ...n a computer network or a computer workstation. It is a subset of computer security.<br> ...
    7 KB (1,093 words) - 19:00, 5 March 2007
  • ...ty and availability, and testing. Perform a [[Information_Security_Audit | security audit]] reassessment when significant technical or logical discrepancies oc ...
    2 KB (329 words) - 13:35, 6 March 2007
  • ...uch as the board, executives, business units, individual users, suppliers, security officers, risk managers, the corporate compliance group, outsourcers and of ITIL Software Asset Management.<br> ...
    2 KB (342 words) - 18:20, 1 May 2006
  • ...y milestones based on agreed sign-off criteria. Issues to consider include software coding standards; naming conventions; file formats; schema and data diction ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produc ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ...user activity and security related events which are reviewed daily by the security administrators.<br> ...revalidations of user group membership and user accounts are performed by security administration.<br> ...
    4 KB (550 words) - 14:34, 1 May 2006
  • ...elecommunications equipment within an operations center will have a higher security zone than I/O operations, with the media used by that equipment stored at y ...en>'''HORSE FACTS:'''</font> Financial institutions should define physical security zones and implement appropriate preventative and detective controls in each ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...igurations of the operating system (OS), browsers, and other network-aware software. ...rus, anti-spyware, and anti-rootkit software. An additional technology is software that limits applications calls to the OS to the minimum necessary for the a ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ITIL Security Management<br> ITIL Security Management Measures<br> ...
    4 KB (544 words) - 17:11, 5 May 2006
  • ...ts (NDA), escrow contracts, continued supplier viability, conformance with security requirements, alternative suppliers, penalties and rewards, etc.<br> ...OX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contrac ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...e defined and documented in accordance with the organization's information security policy.<br> * Act in accordance with the organization's information security policy, including execution of processes or activities particular to the in ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • '''DS 5.2 IT Security Plan '''<br> ...ith appropriate investments in services, personnel, software and hardware. Security policies and procedures are communicated to stakeholders and users. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ITIL 6. Organising Roles and Functions Software Asset Management, Organization, Roles and Responsibilities.<br> ISO 17799 4.1 Information security infrastructure.<br> ...
    3 KB (393 words) - 17:18, 1 May 2006
  • # '''Electronic Mail Software''' ## Only Company approved versions and configurations of electronic mail software listed within the Company System of Record documentation may be used. ...
    7 KB (974 words) - 19:34, 16 January 2014
  • ...elopment of software applications or systems and the purchase of hardware, software, or services from third parties.<br> ==Accounting for Software Costs== ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • ...e system audit process. This section provides templates for an Information Security Program Charter and supporting policies that are required to comply with IS ==Compliance with organizational security policies and technical standards== ...
    6 KB (774 words) - 12:41, 25 May 2007
  • ::'''2. Risk: Insufficient configuration controls can lead to security and availability exposures that may permit unauthorized access to systems a :::a. [[SOX.2.0.31:|'''SOX.2.0.31''']] Application software and data storage systems are properly configured to provision access based ...
    2 KB (324 words) - 18:46, 25 June 2006
  • ...ogram changes, system changes and maintenance (including changes to system software) is standardized, logged, approved, documented and subject to formal change * ISO 17799 10.1.2: Operational systems and application software are subject to strict change management control.<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...e key, generally less secure than hardware schemes, but providing adequate security for many types of applications. See generally Schneier, supra note 18, at § ...
    2 KB (244 words) - 12:37, 16 October 2014
  • Links to helpful or interesting information security documents.<br> :This paper discusses common security vulnerabilities in PHP applications.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • :'''(1)''' the term '''information security''' means protecting information and information systems from unauthorized a :'''(2)''' the term '''national security system''' means any information system (including any telecommunications sy ...
    3 KB (368 words) - 00:50, 1 June 2010
  • ...gement involves users in the design of applications, selection of packaged software and the testing thereof, to maintain a reliable environment.<br> ...al part of development in house. During the planning stages of development security, availability, and processing integrity must be considered. ...
    3 KB (354 words) - 13:39, 22 June 2006
  • ...olicies and practices are in place to ensure the integrity of data through security and end user development methodology.<br> ::'''5. Risk: IT security measures are not aligned with business requirements.'''<br> ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...transmitting, or storing data and information, as well as the operation of software products and tools.<br> :'''C. Browser Software''' ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ...uctions and requirements for life cycle management of Company hardware and software are provided in the [[Sample_System_Development_Life_Cycle_Standard:|'''Sys ...g, testing, and enhancing systems to ensure the integration of appropriate security controls. Specific instructions and requirements for systems development ar ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ...modern computers and receive hundreds of megabytes of data, poses another security headache. A spy (perhaps posing as a cleaning person) could easily conceal ...rs that are no longer in use will contain information that is invisible to software but is nonetheless still there on the physical platter. Some government age ...
    4 KB (702 words) - 15:52, 14 June 2007
  • ...nt policy maximizes the rewards and minimizes the risks of the open-source software model.<br> ...d where employees conform to establish open-source solutions as "approved" software assets.<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • '''DS 5.10 Network Security '''<br> ...at security techniques and related management procedures (e.g., firewalls, security appliances, network segmentation, and intrusion detection) are used to auth ...
    6 KB (781 words) - 12:31, 23 June 2006
  • :::*Evaluate security risks and consequences.<br> :::C. Discuss security goals (e.g., confidentiality, integrity, availability.).<br> ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ITIL Software Asset Management.<br> ISO 17799 4.1 Information security infrastructure.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...fe cycle management of Company information systems, including hardware and software.<br> '''Protection standard''' refers to the required system and security configuration for a network device, system, or application.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)