Search results

Jump to navigation Jump to search
View ( | next 20) (20 | 50 | 100 | 250 | 500)
  • Insert a process diagram, flowchart or other visual representation here to illustrate the process na :::For each new and ongoing activity, capacity requirements should be identified. System tuning and monitoring s ...
    4 KB (586 words) - 01:37, 1 May 2006
  • :::a. SOX.4.1.2: Database activity is monitored sufficiently to ensure that the database integrity is maintain ...the application system is appropriately restricted to prevent unauthorized activity.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...|'''SOX.2.0.26''']] IT security administration monitors and logs security activity at the application and database, and identified security violations are rep ...the application system is appropriately restricted to prevent unauthorized activity. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ...the application system is appropriately restricted to prevent unauthorized activity.<br> Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    6 KB (846 words) - 13:52, 4 May 2006
  • ...og files are reviewed at least daily or more frequently if increased virus activity is identified. Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • '''This diagram illustrates the basic decision process flow to successfully accomplish your ...g and periodic intrusion detection analysis to detect threat and intrusion activity.<br> ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • Insert a process diagram, flowchart or other visual representation here to illustrate the process na ::g. the right to monitor, and revoke, any activity related to the organization’s assets; ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • #'''Defining a framework''' for the activity and an agenda for identification. Includes not performing an activity that could carry risk. An example would be not buying a real property or b ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...or suspected co-conspirators that coincide with incidents of known illegal activity. It is also the Department's policy that the affidavit reflect use of the t ...illance or other law enforcement investigation, that a pattern of criminal activity exists and is likely to continue. If it is clear that the interceptions wil ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • ...ess what the extent of the network is and how it is structured. A network diagram can assist the auditor in this process. The next question an auditor shoul ...access and changes so you are able to identify who made what changes. All activity should be logged. The second arena to be concerned with is remote access, p ...
    21 KB (3,112 words) - 16:52, 15 June 2007
View ( | next 20) (20 | 50 | 100 | 250 | 500)