Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ::'''1. Risk: Controls provide reasonable assurance that the systems are appropriately tested and validated prior to being plac Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.'''<br> ::'''2. Risk: Controls provide reasonable assurance that the systems are appropriately tested and validated prior to being plac ...
    3 KB (497 words) - 14:57, 23 June 2006
  • ...ed in accordance with design specifications, development and documentation standards and quality requirements. Approve and sign off on each key stage of the app ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...
    6 KB (804 words) - 12:14, 23 June 2006
  • '''BS 25999''' is the British Standards Institution (BSI)'s standard in the field of [[Business continuity planning ...s a Business Continuity Management (BCM) standard published by the British Standards Institution (BSI). ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ::'''2. Risk: Controls provide reasonable assurance that the systems are appropriately tested and validated prior to being plac Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • Controls provide reasonable assurance that financial reporting systems and subsystems are appropriately secured t ...ormation requirements, IT configuration, information risk action plans and information security culture into an overall IT security plan. The plan is implemented ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.'''<br> ::'''2. Risk: Controls provide reasonable assurance that the systems are appropriately tested and validated prior to being plac ...
    4 KB (538 words) - 13:16, 23 June 2006
  • =='''Information Security Presentation Samples'''== :Holistic Operational Readiness Security Evaluation - Comprehensive information security control and risk assessment guidance for the enterprise demystifie ...
    5 KB (653 words) - 12:45, 25 April 2007
  • '''AI 6.1 Change Standards and Procedures'''<br> Controls provide reasonable assurance that system changes of financial reporting significance are authorized and ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...pecific instructions and requirements for life cycle management of Company information systems, including hardware and software.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...erform work on Company premises or who have been granted access to Company information or systems, are covered by this standard and must comply with associated gu ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...oint of view, "digital signature" means the result of applying to specific information certain specific technical processes described below. The historical legal ...signature. These Guidelines use "digital signature" only as it is used in information security terminology, as meaning the result of applying the technical proce ...
    22 KB (3,420 words) - 15:18, 3 April 2007
  • ...r abnormal activities that may need to be addressed. Access to the logging information is in line with business requirements in terms of access rights and retenti :::a. SOX.1.14: Controls provide reasonable assurance that systems with potential impact to financial reporting are developed and ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...tion’s operations, including risks in new products, emerging technologies, information systems, and electronic banking.<br> * Inappropriate user access to information systems ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...and business processes depend, requires a consistent approach to security standards in the areas of database configurations, maintenance, and administration. I * Access standards ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...e sensitivity of the data contained or accessible through the zone and the information technology components in the zone. For instance, data centers may be in the ...ers, surveillance equipment, or other similar devices. Since access to key information system hardware and software should be limited, doors and windows must be s ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...particularly authentication credentials and the transmission of sensitive information. It can be used throughout a technological environment, including the oper ...h sufficient to protect information from disclosure until such time as the information’s disclosure poses no material threat. For instance, authenticators should ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • ...line business running. Unauthorized modification of even a single piece of information within a database can lead to reputation damage, litigation, or the collaps ...ite the sensitive nature of these database systems, business, and customer information typically contained within databases, first-hand experience and reoccurring ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...idelines and constraints for the SCM process. Guidelines can come forth of standards or preferences from the customers. Constraints may be corporate policies or ...fairs. An automated system will be used to capture and report all relevant information during the life cycle of a software configuration item. ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ...it function. Tier II questions correspond to the Uniform Rating System for Information Technology (URSIT) rating areas and can be used to determine where the exam ::* Audit information and summary packages submitted to the board or its audit committee ...
    32 KB (4,518 words) - 17:53, 11 April 2007
View ( | ) (20 | 50 | 100 | 250 | 500)