Search results

Jump to navigation Jump to search
  • ...ctive notification of security violations occurs. If there is suspicion of activity, IT Security would work with the Systems Software group to access to securi Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrati ...
    3 KB (421 words) - 20:20, 12 June 2006
  • ...ctive notification of security violations occurs. If there is suspicion of activity, IT Security would work with the Systems Software group to access to securi Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrati ...
    3 KB (422 words) - 00:09, 13 June 2006
  • ::'''2. Risk: Segregation of duties may be compromised and unauthorized activity may occur.'''<br> ...iately restricted to ensure segregation of duties and prevent unauthorized activity.<br> ...
    3 KB (382 words) - 18:02, 3 May 2006
  • :'''Use a visitor log to retain a physical audit trail of visitor activity. Retain this log for a minimum of three months, unless otherwise restricted Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrati ...
    2 KB (317 words) - 14:19, 2 March 2007
  • ...incident response and monitoring coverage for any evidence of unauthorized activity, critical IDS alerts, and/or reports of unauthorized critical system or con Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrati ...
    2 KB (299 words) - 20:14, 2 March 2007
  • ::'''2. Risk: Segregation of duties may be compromised and unauthorized activity may occur.'''<br> ...iately restricted to ensure segregation of duties and prevent unauthorized activity.<br> ...
    3 KB (362 words) - 23:55, 14 June 2007
  • ...|'''SOX.2.0.26''']] IT security administration monitors and logs security activity at the application and database, and identified security violations are rep Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrati ...
    2 KB (321 words) - 18:06, 25 June 2006
  • <br>Produce reports of service desk activity to enable management to measure service performance and service response ti Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    2 KB (264 words) - 17:42, 5 May 2006
  • 2. Determine if an audit trail exists of all emergency activity and verify that it is independently reviewed. Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrati ...
    3 KB (372 words) - 13:56, 23 June 2006
  • :::b. SOX.4.1.2: Database activity is monitored sufficiently to ensure that the database integrity is maintain :::a. SOX.4.1.5: The database application has the functionality to log user activity and security related events which are reviewed daily by the security admini ...
    4 KB (550 words) - 14:34, 1 May 2006
  • ...the application system is appropriately restricted to prevent unauthorized activity.<br> Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    2 KB (307 words) - 15:06, 3 May 2006
  • ...the application system is appropriately restricted to prevent unauthorized activity.<br> Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    2 KB (330 words) - 18:17, 1 May 2006
  • ...the application system is appropriately restricted to prevent unauthorized activity.<br> Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    3 KB (374 words) - 15:05, 3 May 2006
  • ...the application system is appropriately restricted to prevent unauthorized activity. Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    3 KB (394 words) - 17:12, 22 March 2007
  • ::'''1. Risk: Segregation of duties may be compromised and unauthorized activity may occur.'''<br> ...iately restricted to ensure segregation of duties and prevent unauthorized activity.<br> ...
    4 KB (591 words) - 19:45, 14 June 2007
  • The first activity in the Security Management Process is the “Control” sub-process. The Contro ....1.1 contains the name of the (sub) activity and a short definition of the activity.<br> ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • For each new and ongoing activity, capacity requirements should be identified. System tuning and monitoring s Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    3 KB (490 words) - 13:42, 4 May 2006
  • ...Process]] The SCM process can be generalized as depicted in figure 1. This diagram consists of the six main activities of the SCM process, on which will be el [[Image:SCM_model2.png|left|thumb|300px|Figure 2: Process-data diagram for SCM]] ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ...the application system is appropriately restricted to prevent unauthorized activity.<br> Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...em. Operational procedures should cover shift handover (formal handover of activity, status updates, operational problems, escalation procedures and reports on Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    4 KB (522 words) - 20:12, 25 June 2006
  • Insert a process diagram, flowchart or other visual representation here to illustrate the process na :::For each new and ongoing activity, capacity requirements should be identified. System tuning and monitoring s ...
    4 KB (586 words) - 01:37, 1 May 2006
  • :::a. SOX.4.1.2: Database activity is monitored sufficiently to ensure that the database integrity is maintain ...the application system is appropriately restricted to prevent unauthorized activity.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...|'''SOX.2.0.26''']] IT security administration monitors and logs security activity at the application and database, and identified security violations are rep ...the application system is appropriately restricted to prevent unauthorized activity. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ...the application system is appropriately restricted to prevent unauthorized activity.<br> Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    6 KB (846 words) - 13:52, 4 May 2006
  • ...og files are reviewed at least daily or more frequently if increased virus activity is identified. Insert a process diagram, flowchart or other visual representation here to illustrate the process na ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • '''This diagram illustrates the basic decision process flow to successfully accomplish your ...g and periodic intrusion detection analysis to detect threat and intrusion activity.<br> ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • Insert a process diagram, flowchart or other visual representation here to illustrate the process na ::g. the right to monitor, and revoke, any activity related to the organization’s assets; ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • #'''Defining a framework''' for the activity and an agenda for identification. Includes not performing an activity that could carry risk. An example would be not buying a real property or b ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...or suspected co-conspirators that coincide with incidents of known illegal activity. It is also the Department's policy that the affidavit reflect use of the t ...illance or other law enforcement investigation, that a pattern of criminal activity exists and is likely to continue. If it is clear that the interceptions wil ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • ...ess what the extent of the network is and how it is structured. A network diagram can assist the auditor in this process. The next question an auditor shoul ...access and changes so you are able to identify who made what changes. All activity should be logged. The second arena to be concerned with is remote access, p ...
    21 KB (3,112 words) - 16:52, 15 June 2007