Search results

Jump to navigation Jump to search
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...hat production data (real credit card numbers) is not used for testing and development purposes, or is sanitized before use.<br> ...
    2 KB (316 words) - 18:30, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...'' There is a separation of duties between those personnel assigned to the development/test environments and those assigned to the production environment.<br> ...
    2 KB (307 words) - 18:29, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ::'''PCI-6.3.2:''' The test/development environments are separate from the production environment, with access cont ...
    2 KB (304 words) - 18:28, 28 February 2007
  • :'''Obtain and review written software development processes to confirm they are based on industry standards and that security :From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (298 words) - 18:26, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio '''Control Stewards Process Narrative''' ...
    2 KB (297 words) - 18:33, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio '''Control Stewards Process Narrative''' ...
    2 KB (304 words) - 18:36, 28 February 2007
  • ...y right problems, and unit sales that are less than forecasted; unexpected development costs also create risk that can be in the form of more rework than anticipa ...er probabilities of scenarios have been calculated with risk analysis, the process of risk management can be applied to help manage the risk. ...
    1 KB (215 words) - 18:32, 13 April 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio '''Control Stewards Process Narrative''' ...
    2 KB (334 words) - 18:37, 28 February 2007
  • :::a. [[SOX.1.3:|'''SOX.1.3''']] IT management implements system software that does not jeopardize the security of the data and programs being stored ...ermine that a risk assessment of the potential impact of changes to system software is performed. ...
    2 KB (303 words) - 19:58, 23 June 2006
  • ...ications, numerous vulnerabilities can be avoided by using standard system development processes and secure coding techniques.<br> :'''PCI-6.1 Ensure that all system components and software have the latest vendor-supplied security patches.'''<br> ...
    4 KB (578 words) - 18:46, 28 February 2007
  • ...gement involves users in the design of applications, selection of packaged software and the testing thereof, to maintain a reliable environment.<br> ...propriate steps so that application controls are considered throughout the development or acquisition life cycle, e.g., application controls should be included in ...
    3 KB (354 words) - 13:39, 22 June 2006
  • '''PO 8.3 Development and Acquisition Standards'''<br> ...nteroperability; system performance efficiency; scalability; standards for development and testing; validation against requirements; test plans; and unit, regress ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ...n associated with [[ITIL]], but the origins of Change as an IT management process predate ITIL considerably, at least according to the IBM publication "A Man ==Change Management in Development Projects== ...
    4 KB (588 words) - 16:23, 21 March 2007
  • '''AI 2.7 Development of Application Software'''<br> ...legal and contractual aspects are identified and addressed for application software developed by third parties.<br> ...
    6 KB (804 words) - 12:14, 23 June 2006
  • Follow a similar development process as for the development of new systems in the event of major changes to existing systems that resul ::'''1. Risk: The impact of application system changes (e.g., hardware and software) should be evaluated and adjusted to ensure ongoing availability, performan ...
    3 KB (425 words) - 13:19, 23 June 2006
  • '''AI 7.9 Software Release'''<br> Ensure that the release of software is governed by formal procedures ensuring sign-off, packaging, regression t ...
    2 KB (296 words) - 17:59, 3 May 2006
  • ...business requirements into a high-level design specification for software development, taking into account the organization’s technological directions and inform ...assurance that business requirements are gathered and approved during the development and maintenance of systems with potential impact to financial reporting.<br ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...for the management of the networks, systems, and applications that store, process and transmit Company information assets. Company information assets are def ...provided in the [[Sample_System_Development_Life_Cycle_Standard:|'''System Development Life Cycle Standard''']].<br> ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ...guration management software is available. When a system needs hardware or software upgrade, a computer technician can access the configuration management prog ...lopment, is called [[Software Configuration Management]] (SCM). Using SCM, software developers can keep track of the source code, documentation, problems, chan ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ==Change management in development projects== ...gement methodology adopted for the project. However close liaison between development project managers and the Change Manager is expected and the project manager ...
    4 KB (523 words) - 10:24, 23 April 2010
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (345 words) - 18:55, 28 February 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (345 words) - 14:02, 1 March 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (346 words) - 14:03, 1 March 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (345 words) - 13:57, 1 March 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (346 words) - 14:00, 1 March 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (346 words) - 14:03, 1 March 2007
  • :Examines the facilities, configuration issues, hardware and gear, software, research material that enterprises need to construct their own incident re :'''Development of Information Classification Standard:''' [[Media:Development-of-Information-Classification-Standard.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (352 words) - 13:58, 1 March 2007
  • ...or the IT environment. Assets include all elements of [[Computer software|software]] and [[Computer hardware|hardware]] that are found in the business environ ==Software Asset Management== ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...organizational structure that reflects business needs. In addition, put a process in place for periodically reviewing the IT organizational structure to adju ::'''1. Risk: Development and maintenance of system with potential impact to financial reporting bypa ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (351 words) - 13:56, 1 March 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (350 words) - 18:57, 28 February 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (350 words) - 13:59, 1 March 2007
  • ...acquisition and development process. Consider functionality, hardware and software configuration, integration and performance testing, migration between envir '''Process Narrative'''<br> ...
    3 KB (432 words) - 13:02, 23 June 2006
  • ...on or modification projects, that all necessary elements such as hardware, software, transaction data, master files, backups and archives, interfaces with othe '''Process Narrative'''<br> ...
    3 KB (436 words) - 12:51, 23 June 2006
  • Software security policy<br> • System development and maintenance ...
    3 KB (360 words) - 16:59, 25 June 2006
  • '''AI 2.10 Application Software Maintenance'''<br> Develop a strategy and plan for the maintenance and release of software applications. Issues to consider include release planning and control, reso ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...he application developer. Quite often these unnecessary changes introduced software bugs necessitating further changes.<br> Later it became a fundamental process in quality control. It is also formally used where the impact of a change c ...
    3 KB (533 words) - 14:15, 23 April 2010
  • ...ssessment when significant technical or logical discrepancies occur during development or maintenance.<br> '''Process Narrative'''<br> ...
    2 KB (329 words) - 13:35, 6 March 2007
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> Through the development and management of key information security processes.<br> ...
    2 KB (305 words) - 17:31, 3 August 2006
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> '''''Through the development and management of key information security processes.'''''<br> ...
    2 KB (309 words) - 17:34, 3 August 2006
  • ...tems software in accordance with its acquisition, development and planning process.<br> '''Process Narrative'''<br> ...
    3 KB (390 words) - 12:10, 23 June 2006
  • ==Development and Acquisition== ...elopment of software applications or systems and the purchase of hardware, software, or services from third parties.<br> ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • '''Process Narrative'''<br> Insert a description of the process narration that is applicable to the existing control statement this narrati ...
    3 KB (382 words) - 18:02, 3 May 2006
  • ...ed the research, and they became the foundation from which CMU created the Software Engineering Institute (SEI). Like any model, it is an abstraction of an exi When it is applied to an existing organization's software development processes, it allows an effective approach toward improving them. Eventuall ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • Establish procedures in line with the enterprise development and change standards that require a post-implementation review of the opera ...gement involves users in the design of applications, selection of packaged software and the testing thereof, to maintain a reliable environment.<br> ...
    3 KB (394 words) - 11:59, 23 June 2006
  • ===Control of operational software=== Procedures should be implemented to control the installation of software on operational systems, to minimize the risk of interruptions in or corrupt ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...on, incident handling, distribution controls (including tools), storage of software, and review of the release and documentation of changes. The plan should al ...gement involves users in the design of applications, selection of packaged software and the testing thereof, to maintain a reliable environment.<br> ...
    4 KB (530 words) - 11:58, 23 June 2006
  • ...ogram changes, system changes and maintenance (including changes to system software) is standardized, logged, approved, documented and subject to formal change ::'''8. Risk: Concurrent access to code in development leads to improper or incomplete changes.'''<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...e that the acquisition of IT-related infrastructure, facilities, hardware, software and services satisfies business requirements.<br> ...'SOX.1.15''']] The organizations SDLC policies and procedures consider the development and acquisition of new systems and major changes to existing systems.<br> ...
    3 KB (442 words) - 13:59, 23 June 2006
  • :::a. SOX.1.8: Obtain a listing of system development and maintenance projects and, for a sample, obtain evidence that requiremen '''Process Narrative'''<br> ...
    3 KB (446 words) - 16:36, 1 May 2006
  • ::'''2. Risk: The impact of application system changes (e.g., hardware and software) should be evaluated and adjusted to ensure ongoing availability, performan ...OX.6.1.1''']] The impact of application system changes (e.g., hardware and software) should be evaluated and adjusted to ensure ongoing availability performanc ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...s should cover all components of the information system (e.g., application software, facilities, technology, and user procedures) and ensure that the informati '''Process Narrative'''<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • ==Software Configuration Management== ...aining software integrity, traceability, and accountability throughout the software life cycle. ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • :*'''[[Systems Development and Maintenance:|'''Systems Development and Maintenance''']]<br> ...nformation Security standards that are required to comply with ISO Systems Development and Maintenance objectives and support the objectives established in the As ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • =='''Sample System Development Life Cycle Standard'''== ...infrastructure, including networks, systems, and applications that store, process, and transmit information assets.<br> ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • '''Process Narrative'''<br> Insert a description of the process narration that is applicable to the existing control statement this narrati ...
    5 KB (649 words) - 18:23, 5 May 2006
  • Identify a risk owner and affected process owners, and develop and maintain a risk response to ensure that cost-effect '''Process Narrative'''<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...nvironmental protection and security. Ensure compatibility of hardware and software to restore archived data and periodically test and refresh archived data. ...OX.1.4''']] The organization has policies and procedures regarding program development, program change, access to programs and data, and computer operations, whic ...
    5 KB (700 words) - 18:07, 23 June 2006
  • '''Scenario analysis''' is a process of analyzing possible future events by considering alternative possible out *[http://www.swemorph.com/pdf/cornwallis3.pdf Scenario Development using Computer Aided Morphological Analysis] From the [http://www.swemorph. ...
    4 KB (607 words) - 18:29, 16 February 2007
  • ===Authorization process for information processing facilities=== A management authorization process for new information processing facilities and capabilities should be define ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ...OX.1.4''']] The organization has policies and procedures regarding program development, program change, access to programs and data, and computer operations, whic ::* PCI-1.1.1 A formal process for approving and testing all external network connections and changes to t ...
    6 KB (781 words) - 12:31, 23 June 2006
  • ...anagers, administrators and those designated by the Asset Owner to manage, process or store information assets.<br> ::*Proper use of software and Electronic Communications Systems<br> ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • ...nt policy maximizes the rewards and minimizes the risks of the open-source software model.<br> ...d where employees conform to establish open-source solutions as "approved" software assets.<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • '''Process Narrative'''<br> Insert a description of the process narration that is applicable to the existing control statement this narrati ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...to fill out. This form can serve as the basis for an iterative negotiation process that helps all parties to arrive at realistic expectations and well-underst ...er recovery machines are normally used for other purposes such as software development. Tapes containing data that is current to within 24 hours are kept at the d ...
    20 KB (3,195 words) - 02:47, 23 February 2007
  • ...infrastructure, including networks, systems, and applications that store, process, and transmit information assets.<br> ...fe cycle management of Company information systems, including hardware and software.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • Establish a process to monitor service delivery to ensure the supplier is meeting current busin '''Process Narrative'''<br> ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ...ther than one comprehensive handbook. This approach facilitates the update process as the individual booklets can be revised as needed. Going forward, the FFI ==Revision Process== ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...infrastructure, including networks, systems, and applications that store, process, and transmit information assets.<br> '''Change Control''' refers to the formal and approved process for submitting, reviewing, and approving changes to the production environm ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • :This excellent paper by Next Generation Security Software discusses common SQL injection techniques used to subvert Web-based applica :'''[[Delivering eBusiness Solutions: Creating Secure Software (PDF)]]'''<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • =='''The audit process'''== :* Research all operating systems, software applications and data center equipment operating within the data center. ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...at different physical locations, using similar but different machines and software which may communicate over different communications lines. Different trade ===Including information security in the business continuity management process=== ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ...ty to escalate issues to the board both through the normal audit committee process and through the more direct communication with outside directors.<br> ...ve 4: Determine the qualifications of the IT audit staff and its continued development through training and continuing education.=== ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • The ITIL-process Security Management describes the structured fitting of information securit ...imed to be rich in content for physical security but weak in areas such as software and or application security and logical security in the ICT infrastructure. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ...risk assessment. The standard is also intended to provide a guide for the development of organizational security standards and effective security management prac Information assets must be protected from destructive software elements such as viruses and malicious code that impair normal operations. ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • Control procedures must be implemented in the software programming methodology to ensure all data is reviewed during quality assur '''Follow exception process, if you cannot meet above requirement.'''<br> ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ==Information assurance process== The information assurance process typically begins with the enumeration and classification of the information ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...infrastructure, including networks, systems, and applications that store, process, and transmit information assets.<br> ...mpany information stores that include sources such as hardware devices and software applications; standard computing environments; archival systems; and period ...
    9 KB (1,213 words) - 13:20, 9 March 2009
  • ...een developed to provide guidance across the breadth of IT infrastructure, development, and operations. ===Development=== ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...cting fair competition with legitimate businesses, and disrupting economic development. Ultimately, laundered money flows into global financial systems where it ::* Streamlined CTR exemption process.<br> ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • ...occurrence and lower loss are handled in descending order. In practice the process can be very difficult, and balancing between risks with a high probability ...rializes. Relationship risk appears when ineffective collaboration occurs. Process-engagement risk may be an issue when ineffective operational procedures are ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...rograms in the $ORACLE_HOME/bin directory and give ownership to the oracle software owner.<br> ...lowing DBA utilities a protection of 750 to restrict the use to the Oracle software owner.<br> ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...gy and automation. The increased efficiency and effectiveness of the audit process enables more frequent or real time audits and hence enhances the reliabilit ...ing was developed at AT&T Bell Laboratories in 1989. Known as a continuous process auditing system (CPAS), the system developed by Vasarhelyi and Halper provi ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...the essence of IT security risk management is which can be defined as the process of identifying risk, assessing risk, and taking steps to reduce risk to an ...business asset you are attempting to protect with an IT security system or process that would be lost in a single exposure, and the Annualized Rate of Occurre ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...rtments such as finance, have the necessary input into the decision making process. This prevents IT from independently making and later being held solely res ...les for the responsibility of information, business processes, application software, infrastructure, etc.<br> ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...re a Remote User will gain access to a network or system: 1) a hardware or software token which produces a code that will change randomly at short time interva ::2. Users must follow the Company-approved remote access request process by submitting required forms that provide a description of the information ...
    14 KB (1,956 words) - 14:16, 1 May 2010
  • ...d User License Agreement (“EULA”). The court held that the transfer of the software to the plaintiff was a sale, not a license, and that the EULA was not bindi ...Further, the court concluded, "where consumers are urged to download free software at the immediate click of a button, a reference to the existence of license ...
    18 KB (2,884 words) - 17:00, 13 April 2011
  • '''Risk management''' is the process of measuring, or assessing, risk and developing strategies to manage it. St ...robability of occurrence and lower loss are handled later. In practice the process can be very difficult, and balancing between risks with a high probability ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...el, in accordance with the SIRT Routine Operations Procedure, to routinely process security incidents and intrusion detected by automated or manual detection ...for automated notification and/or downloading of new attack signatures or software patches.<br> ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ...are two algorithms: one for ''signing'', in which a secret key is used to process the message (or a hash of the message, or both), and one for ''verification ...r less than thoroughly informed designers), in the implementation (e.g., a software bug), in a failure of the assumptions on which the design was based (e.g., ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • A security policy exists to protect a site's hardware, software and - Be aware what software you run and very wary of software of ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • ...ls are submitted by the public to the Registrar of Copyrights, and after a process of hearings and public comments, the final rule is recommended by the Regis *Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of e ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • '''Antivirus software''' ...the operating system and electronic files. Also known as virus protection software ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • :* An enrollment process to add new users to the system :* An authorization process to add, delete, or modify authorized user access to operating systems, appl ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...ve Right to their respective Writings and Discoveries.” In order to foster development of creative works, copyright law provides a limited grant of exclusive righ ...ion.” 17 U.S.C. § 102. These works include literary works (which encompass software), musical works, dramatic works, pictorial works, sculptural works, graphic ...
    14 KB (2,130 words) - 06:38, 11 April 2011
  • '''Corporate governance''' is the set of business process, customs, policies, laws, and institutions affecting the way a corporation ...d economy, and hence good corporate governance is a tool for socioeconomic development. ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • * Open applications: Consumers should be able to download and utilize any software applications, content, or services they desire; ==Development of the concept== ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...e, that fact does not diminish the devastating effects that Zeus (or other software like Zeus) can do to a computer and the user. For example, the article sta * Infiltrating organizations that store and process large amounts or particularly valuable personal information ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • * cinematographic works to which are assimilated works expressed by a process analogous to cinematography; * photographic works, to which are assimilated works expressed by a process analogous to photography; ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...d economy, and hence good corporate governance is a tool for socioeconomic development. ...r even of the naive institutions, of which there are many). Note that this process occurred simultaneously with the direct growth of individuals investing ''i ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...tion, emphasis is placed on the ability of a foreign court to follow [[due process]].<ref name="Section323"/> The Act also requires the Secretary of Treasury ...t data system was to be on the utilization of biometric technology and the development of tamper-resistant documents readable at ports of entry. They also wanted ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...et service providers where law enforcement obtained the records using less process than a search warrant. As discussed in Chapter 3.D, the Stored Communicatio ...th Cir. 2005) (finding that agent's use of "sophisticated" Encase forensic software did not exceed scope of consent to search laptop). ...
    154 KB (23,956 words) - 13:16, 5 August 2011