Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • :'''(1)''' the term '''information security''' means protecting information and information systems from unauthorized a :'''(2)''' the term '''national security system''' means any information system (including any telecommunications sy ...
    3 KB (368 words) - 00:50, 1 June 2010
  • ...tackers are unlikely to find them. The technique stands in contrast with [[security by design]], although many real-world projects include elements of both str ...aphy was disturbing to the US government, which seems to have been using a security through obscurity analysis to support its opposition to such work. ...
    11 KB (1,798 words) - 14:44, 14 June 2007
  • Links to helpful or interesting information security documents.<br> :This paper discusses common security vulnerabilities in PHP applications.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...or licenses computerized 'personal information' to disclose any breach of security (to any resident whose unencrypted data is believed to have been disclosed) The bill mandates various mechanisms and procedures with respect to many aspects of this scenario, subject also to other define ...
    3 KB (522 words) - 13:52, 26 October 2011
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produc ...bility study through maintenance of the completed application. Verify that security, availability, and process integrity requirements are included.<br> ...
    6 KB (804 words) - 12:14, 23 June 2006
  • ...ment 2: Do not use vendor-supplied defaults for system passwords and other security parameters.''']] * [[PCI 8:|'''Requirement 8: Assign a unique ID to each person with computer access.''']] ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • * [[Purpose of computer crime laws]] * [[Computer]] ...
    9 KB (1,069 words) - 20:29, 22 February 2009
  • ==Information Security Audit== ...rom auditing the physical security of data centers to the auditing logical security of databases and highlights key components to look for and different method ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...elecommunications equipment within an operations center will have a higher security zone than I/O operations, with the media used by that equipment stored at y ...en>'''HORSE FACTS:'''</font> Financial institutions should define physical security zones and implement appropriate preventative and detective controls in each ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...re covered by this standard and must comply with associated guidelines and procedures.<br> ...rs shall abide by and comply with any and all copyright laws pertaining to computer software and by any software license agreements that are legally applicable ...
    7 KB (953 words) - 14:13, 1 May 2010
  • ...stionnaire, financially significant information systems are defined as the computer hardware and software, including system programs and application programs, ...itate the nature and extent of the test procedures to be performed. (“Test procedures” have been removed from this version of exhibit, which is for distribution ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ...he Secretary of Commerce of standards and guidelines pertaining to Federal computer systems; (5) designate executive agents for information technology acquisit ...icer and Chief Financial Officer of such agency, to establish policies and procedures to ensure the integration within such agency of financial and information s ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...software is available. When a system needs hardware or software upgrade, a computer technician can access the configuration management program and database to ...oject (product) evolves appropriately, various Management mechanisms, e.g. procedures and quality gates should be employed within the organization’s life cycles. ...
    7 KB (942 words) - 15:09, 23 March 2007
  • :1. physical access, e.g. to offices, computer rooms, filing cabinets; ...or the continuation of external party access in the case of an information security incident; ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • :* Replicate itself within a computer and transmit itself between computers. ...al controls to protect against malicious code use technology, policies and procedures, and training, all applied in a layered manner from perimeters inward to ho ...
    4 KB (568 words) - 17:25, 10 April 2007
  • :* Information Security :* SP-10; Control And Security Risks in Electronic Imaging Systems, December 1993<br> ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...ing has not kept pace with the real time economy. Traditional manual audit procedures are labor and time intensive, which limits audit frequency to a periodic ba ...took the premise and integrated the Security Trifecta philosophy of cyber security with Governance, Technology and Vigilance. The process is technically relia ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...a law enforcement problem, but poses a serious national and international security threat as well. ::* Required banking agencies to develop anti-money laundering examination procedures; and ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • ==Audit Guidance Examination Procedures== ...audit coverage and to what extent, if any, the examiner may rely upon the procedures performed by the auditors in determining the scope of the IT examination.<b ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • '''Can you mitigate database security risks?'''<br> *Use database views, stored procedures, and [[Encryption | encryption]]. ...
    28 KB (4,261 words) - 11:45, 28 March 2008
View ( | ) (20 | 50 | 100 | 250 | 500)