Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...tify trends in usage, particularly in relation to business applications or management information system tools. Managers should use this information to identify ITIL 4.5 Establishing the IS direction ICT Infrastructure Management, Design and Planning.<br> ...
    4 KB (586 words) - 01:37, 1 May 2006
  • ...tives and backlogged transactions, and the costs associated with downtime. Management should establish recovery priorities for business processes that identify e ...ss processes based on their importance to the institution's achievement of strategic goals and maintenance of safe and sound practices. However, this prioritiza ...
    3 KB (453 words) - 18:45, 25 April 2007
  • ...y policy exists and has been approved by an appropriate level of executive management. ...SOX.2.0.19''']] An IT security plan exists that is aligned with overall IT strategic plans. The IT security plan is updated to reflect changes in the IT environ ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ** '''IT [[Project Portfolio Management]]''' - An inventory of current projects being managed by the information te *** Example: Availability of open-source [[learning management system]]s such as [[Moodle]] ...
    5 KB (777 words) - 17:59, 16 February 2007
  • ...the agencies and revised, if necessary, based on examiner feedback. Senior management of each agency performed the final review and approval and then formally re :* IT Management ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • :* Stealing strategic or customer data for corporate espionage or fraud schemes. ...nformation sharing outside of that required for legitimate business needs. Management should obtain signed confidentiality agreements before granting new employe ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ...equiring expertise in accounting, fraud examination, [[forensic science]], management science, systems engineering, [[security engineering]], and [[criminology]] ...complete, the IA practitioner then develops a [[Risk Management Plan|risk management plan]]. This plan proposes countermeasures that involve mitigating, elimina ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...mation technology (IT) systems and their performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiat ...n technology related matters in contemporary organizations and states that strategic IT decisions should be owned by the corporate board, rather than by the ch ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...that information security management processes are integrated with agency strategic and operational planning processes;<br> ::'''(A)''' shall include testing of management, operational, and technical controls of every information system identified ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...that information security management processes are integrated with agency strategic and operational planning processes;<br> ::'''(A)''' shall include testing of management, operational, and technical controls of every information system identified ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source sof ...that are preferred over the ones that are ill-fitted to your enterprise's strategic needs. Most important, however, you must clearly lay out scenarios of "fitn ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...covered that with an organized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by t ...lping you understanding the core elements of a successful IT security risk management program for a commercial enterprise, the processes of calculating the cost ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]]s that are intended to support businesses in achieving both qu ...s (hence the term ''Library''), each of which covers a core area within IT Management. The names ''ITIL'' and ''IT Infrastructure Library'' are Registered Trade ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...ancial information is critical for day-to-day business decisions regarding strategic planning, capital acquisition, credit decisions, supplier partnerships, and ...box logging is to protect a continuous auditing system against auditor and management manipulations. ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...pted to accomplish this by setting up [[risk management|risk]] and capital management requirements designed to ensure that a bank has capital adequacy for the ri ...er the title of residual risk. It gives banks a power to review their risk management system. ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • The board of directors and senior management are responsible for ensuring that the institution’s system of internal cont ...hould assign responsibility for the internal audit function to a member of management (hereafter referred to as the “internal audit manager”) who has sufficient ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ::* Management’s role in IT audit activities; :3. Review management’s response to issues raised since the last examination. Consider: ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ==Risk Management== ...ng some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disas ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...corporation is governed. The principal stakeholders are the shareholders, management, and the board of directors. Other stakeholders include employees, customer ...needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integr ...
    45 KB (6,604 words) - 15:20, 15 April 2010
View ( | ) (20 | 50 | 100 | 250 | 500)