Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • '''Federal Information Security Management Act (FISMA)''' ...the implementation of and compliance with the Federal Information Security Management Act including: ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ...demands. Enforce a disciplined approach to portfolio, program and project management, insisting that the business takes ownership of all IT-enabled investments ...
    3 KB (393 words) - 14:35, 21 June 2006
  • ...ystems produce inaccurate results or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milesto :::a. SOX.1.2: IT management involves users in the design of applications, selection of packaged softwar ...
    3 KB (354 words) - 13:39, 22 June 2006
  • ::[[Image:Key-control.jpg]][[PCI-6.4.2:|PCI-6.4.2 Management sign-off by appropriate parties.]]<br> ...ased on secure coding guidelines such as the Open Web Application Security Project guidelines. Review custom application code to identify coding vulnerabiliti ...
    4 KB (578 words) - 18:46, 28 February 2007
  • ...ogy department and their status. Note: It is not common to report current project status inside a future-looking strategy document. *** Example: Availability of open-source [[learning management system]]s such as [[Moodle]] ...
    5 KB (777 words) - 17:59, 16 February 2007
  • ==Welcome to the Holistic Operational Readiness Security Evaluation (HORSE) project Wiki.== ...educational content, and to providing the full content of this wiki-based project to the public free of charge.<br> ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...ystems produce inaccurate results or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milesto :::a. [[SOX.1.2:|'''SOX.1.2''']] IT management involves users in the design of applications, selection of packaged softwar ...
    4 KB (530 words) - 11:58, 23 June 2006
  • ==Software Configuration Management== Software Configuration Management (SCM) is the discipline whose objective is to identify the configuration of ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • '''DS 11.6 Security Requirements for Data Management '''<br> ...security requirements should be identified at the requirements phase of a project and justified, agreed, and documented as part of the overall business case ...
    5 KB (649 words) - 18:23, 5 May 2006
  • ...ystems produce inaccurate results or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milesto :::a. [[SOX.1.2:|'''SOX.1.2''']] IT management involves users in the design of applications, selection of packaged softwar ...
    3 KB (365 words) - 19:02, 17 April 2007
  • '''Rationale —''' Configuration management includes procedures such that security, availability and processing integri ...ystems produce inaccurate results or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milesto ...
    4 KB (501 words) - 18:24, 25 June 2006
  • ...formation systems, a formal evaluation and approval of the test results by management of the affected user department(s) and the IT function. The tests should co ...security requirements should be identified at the requirements phase of a project and justified, agreed, and documented as part of the overall business case ...
    5 KB (730 words) - 19:05, 17 April 2007
  • ...the agencies and revised, if necessary, based on examiner feedback. Senior management of each agency performed the final review and approval and then formally re :* IT Management ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...anagement procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requ ...security requirements should be identified at the requirements phase of a project and justified, agreed, and documented as part of the overall business case ...
    6 KB (819 words) - 13:54, 23 June 2006
  • '''DS 2.3 Supplier Risk Management'''<br> ...iness standards in accordance with legal and regulatory requirements. Risk management should further consider non-disclosure agreements (NDA), escrow contracts, ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...estments that will support the overall business goals, each significant IT project and expenditure must be linked to a specific business goal. Furthermore, th ...ss leadership to prioritize the portfolio. Each line item in the master IT project list is evaluated against the overall business goals, and the business lead ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...mation technology (IT) systems and their performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiat ...ce]] and deals primarily with the connection between business focus and IT management of an organization. It highlights the importance of information technology ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...security requirements should be identified at the requirements phase of a project and justified, agreed, and documented as part of the overall business case :::If considered appropriate, for example for cost reasons, management may wish to make use of independently evaluated and certified products. Fur ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...of government contractors' ''processes'' to perform a contracted software project. The CMM is based on the process maturity framework first described in the ...technology (IT), services, business processes generally, and human capital management. The CMM has been used extensively worldwide in government, commerce, indus ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...security requirements should be identified at the requirements phase of a project and justified, agreed, and documented as part of the overall business case :::*If considered appropriate, for example for cost reasons, management may wish to make use of independently evaluated and certified products. Fur ...
    6 KB (878 words) - 13:34, 23 June 2006
View ( | ) (20 | 50 | 100 | 250 | 500)