Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...Develop and maintain secure systems and applications and implement Strong Access Control Measures. == * Unscrupulous individuals use security vulnerabilities to gain privileged access to systems. Many of these vulnerabilities are fixed via vendor security pat ...
    4 KB (578 words) - 18:46, 28 February 2007
  • ...ous, fraudulent, or economic reasons. Additionally, the degree of internal access granted to some users increases the risk of accidental damage or loss of in ...n information on all new employees. The sensitivity of a particular job or access level may warrant additional background and credit checks. Institutions sho ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ...e National Institute of Standards and Technology (NIST), CobiT, HIPAA, the Internet Security Forum (ISF), and ISO 27002 each provide robust guidance on physica ...nes Physical and Environmental Security objectives to prevent unauthorized access, damage and interference to business premises and information; prevent loss ...
    4 KB (592 words) - 19:28, 14 June 2007
  • ...ad within minutes (some say even seconds) with devastating consequences to Internet and otherwise. ...to recognize the safety of a limited set of programs (e.g., those that can access or modify only a given subset of machine resources) while rejecting both so ...
    4 KB (570 words) - 19:02, 14 June 2007
  • By not allowing access to the Internet from company resources.<br> ...
    2 KB (305 words) - 17:31, 3 August 2006
  • By not allowing access to the Internet from company resources.<br> ...
    2 KB (309 words) - 17:34, 3 August 2006
  • ...y to the Internet (e.g., laptops used by employees), and which are used to access the organization’s network, have personal firewall software installed and a ...
    3 KB (340 words) - 11:39, 3 March 2007
  • ...ed by others to perform work on Company premises, or who have been granted access to Company information or systems, are covered by this standard and must co ...any information systems and equipment including Electronic Mail Resources, Internet Resources, and Telecommunications Resources.<br> ...
    6 KB (857 words) - 12:22, 19 July 2007
  • ...e, or have read or write permission to a socket for communicating over the Internet.<br> ...
    2 KB (341 words) - 18:37, 14 June 2007
  • ...the logging information is in line with business requirements in terms of access rights and retention requirements.<br> ::'''4. Risk: Users may have inappropriate access to the application system.'''<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...sms. The code also can be hidden in programs that are downloaded from the Internet or brought into the institution on diskette. At times, the malicious code ...Most malicious code is general in application, potentially affecting all Internet users with whatever operating system or application the code needs to funct ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ...ed by others to perform work on Company premises, or who have been granted access to and use of Company information or systems are covered by this standard a ...able Use Standard:|'''Sample Electronic Mail Acceptable Use Standard''']], Internet Resources, and Telecommunications Resources.<br> ...
    7 KB (953 words) - 14:13, 1 May 2010
  • ...es also have attempted to regulate material distributed to minors over the Internet, with mixed success. ...itutional a state statute that prohibited sending sexual material over the Internet with the intent to seduce minors. But see Hatch v. Superior Court, 80 Cal. ...
    4 KB (639 words) - 19:02, 10 April 2011
  • ...to restrict access to sites based on geographic locale of each particular Internet user, COPA essentially required that every publisher abide by the most rest ...nment must independently link all images upon which conviction is based to Internet. 18 U.S.C.A. § 2252A(a)(5)(B). U.S. v. Henriques, 234 F.3d 263 (5th Cir. 20 ...
    9 KB (1,358 words) - 11:00, 18 February 2009
  • ...to restrict access to sites based on geographic locale of each particular Internet user, COPA essentially required that every publisher abide by the most rest ...nment must independently link all images upon which conviction is based to Internet. 18 U.S.C.A. § 2252A(a)(5)(B). U.S. v. Henriques, 234 F.3d 263 (5th Cir. 20 ...
    9 KB (1,359 words) - 12:35, 18 February 2009
  • ...each type of crime has a range of punishments. In California, for example, access to defraud can be treated as a felony, involving punishment of up to three ...ed sexual conduct was not available after conviction of attempting via the internet to persuade a minor to engage in sexual activity and traveling in interstat ...
    4 KB (680 words) - 12:52, 18 February 2009
  • ...ave committed the crime. Where a log is maintained of individuals who have access to the computer, it may be possible to elicit an admission that no effort w ...of expert regarding availability of allegedly comparable materials on the Internet, as mere availability of such materials did not show that community accepte ...
    3 KB (431 words) - 21:02, 22 February 2009
  • ...fferent coding errors can be exploited by an attacker to gain unauthorized access to a computer system. In addition, design considerations for minimizing the ...nt is also relevant to traditional dial-up users (users who connect to the Internet using a modem).<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...an include advising employees of the existence of a trade secret, limiting access to the information to a "need to know basis," requiring employees to sign c ==Disclosure over the Internet== ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • :* How would the department function if mainframe, network and/or Internet access were not available? ...
    3 KB (453 words) - 18:45, 25 April 2007
View ( | ) (20 | 50 | 100 | 250 | 500)