Search results

Jump to navigation Jump to search
View ( | next 250) (20 | 50 | 100 | 250 | 500)
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (284 words) - 19:38, 1 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (286 words) - 16:55, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (276 words) - 17:40, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (281 words) - 17:42, 5 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (279 words) - 14:17, 3 May 2006
  • ...ong to itself. Thus, a flaw in that program could put the entire system at risk. On the other hand, a Web server that runs inside a virtual private server ...
    2 KB (343 words) - 18:39, 14 June 2007
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (292 words) - 19:08, 1 May 2006
  • ::'''2. Risk: System integrity and availability is compromised because emergency changes ...
    3 KB (372 words) - 13:56, 23 June 2006
  • ::'''1. Risk: Business requirements are not met or inadequately tested. Systems produce ...
    3 KB (354 words) - 13:39, 22 June 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (284 words) - 12:41, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (270 words) - 14:54, 5 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (295 words) - 01:42, 2 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (287 words) - 17:04, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (302 words) - 17:57, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (303 words) - 18:29, 1 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (288 words) - 14:17, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (300 words) - 13:39, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (294 words) - 18:25, 5 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (308 words) - 18:06, 5 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (294 words) - 13:08, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (288 words) - 14:15, 1 May 2006
  • ...hange, but the modification of which could indicate a system compromise or risk of compromise. File integrity monitoring products usually come pre-configur ...
    3 KB (365 words) - 20:31, 2 March 2007
  • ::'''4. Risk: Poorly managed systems or system functionality does not delivered as requi ...
    3 KB (342 words) - 15:05, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (354 words) - 20:12, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (301 words) - 12:27, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (307 words) - 01:31, 2 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (284 words) - 14:37, 21 June 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (294 words) - 18:26, 5 May 2006
  • ..., but accounting, security, and other areas of expertise. Counsel runs the risk of embarrassing cross-examination by the prosecution if he or she allows an ...
    2 KB (358 words) - 19:18, 22 February 2009
  • ::'''1. Risk: Insufficient control over authorization, authentication, nonrepudiation, d ...
    3 KB (360 words) - 16:59, 25 June 2006
  • ...ets address significant changes in technology since 1996 and incorporate a risk-based examination approach. The 1996 Handbook has been replaced by these bo ...oklet]] provides guidance on the [[Audit_Guidance_Examination_Procedures | risk-based IT audit]] practices of financial institutions and technology service ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • # [[IT risk management#Risk assessment|Risk assessment]] ...ering this area such as [[ISO/IEC 27005]]. The use of information security risk analysis to drive the selection and implementation of information security ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (298 words) - 01:59, 2 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (299 words) - 17:41, 5 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (294 words) - 17:10, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (310 words) - 01:37, 2 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (302 words) - 18:25, 5 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (311 words) - 02:04, 2 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (309 words) - 18:13, 1 May 2006
  • ::'''9. Risk: Insufficient control over authorization, authentication, nonrepudiation, d ...
    3 KB (360 words) - 17:03, 9 April 2007
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (311 words) - 14:12, 1 May 2006
  • ...ly used where the impact of a change could have severe [[Risk_management | risk]] and or financial consequence. Typical examples from the computer and comp ...'''IMPACT ASSESSMENT'''. The IMPACT ASSESSOR or ASSESSORS then make their risk analysis and make a judgment on who should carry out the Change, typically ...
    3 KB (533 words) - 14:15, 23 April 2010
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccur ...
    3 KB (369 words) - 16:09, 21 June 2006
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccur ...
    3 KB (368 words) - 11:58, 22 June 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (305 words) - 14:51, 5 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (303 words) - 18:06, 1 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (298 words) - 16:59, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (316 words) - 17:47, 3 May 2006
  • ::'''6. Risk: Insufficient control over authorization, authentication, nonrepudiation, d ...
    3 KB (382 words) - 17:41, 25 June 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (306 words) - 13:13, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (296 words) - 17:01, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (296 words) - 17:59, 3 May 2006
  • ...t enable the organization to manage the IT Asset Portfolio with respect to risk, cost, control, [[IT Governance]], compliance and business performance obje *Risk reduction through standardization, proper documentation, loss detection ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ::'''1. Risk: Business requirements are not met or third parties have inappropriate acce ...
    3 KB (379 words) - 18:17, 14 June 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (329 words) - 01:35, 2 May 2006
  • ::'''3. Risk: Lost data could significantly impact financial reporting.''' ...
    3 KB (362 words) - 17:05, 9 April 2007
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (329 words) - 13:34, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (329 words) - 19:26, 1 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (339 words) - 18:28, 1 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (337 words) - 19:47, 1 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (332 words) - 18:24, 5 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (332 words) - 12:39, 4 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (319 words) - 17:09, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (347 words) - 13:38, 4 May 2006
  • '''8. Risk: Insufficient security standards may allow unauthorized access to productio ...
    3 KB (405 words) - 00:10, 13 June 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (333 words) - 16:42, 5 May 2006
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosu ::'''(A)''' assessing the risk and magnitude of the harm that could result from the unauthorized access, u ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...nvestment practices. Generally speaking, these rules mean that the greater risk to which the bank is exposed, the greater the amount of capital the bank ne # Ensuring that Capital requirement is more risk sensitive; ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (346 words) - 18:25, 1 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (329 words) - 13:35, 6 March 2007
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (357 words) - 14:15, 3 May 2006
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (345 words) - 01:18, 2 May 2006
  • ...tion process, access to a credit report is critical for a lender to make a risk assessment. Because a credit freeze effectively stops any access to the cre ...ue a loan in the borrower's name. Hence, credit freezing should reduce the risk that loans or credit cards will be issued fraudulently. Credit freezes do h ...
    4 KB (663 words) - 12:59, 12 November 2011
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosu ::'''(A)''' assessing the risk and magnitude of the harm that could result from the unauthorized access, u ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • ...ionally, the degree of internal access granted to some users increases the risk of accidental damage or loss of information and systems.<br> '''Risk exposures from internal users include:''' ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • '''Risk Association Control Activities:'''<br> ...
    3 KB (377 words) - 18:52, 4 May 2006
  • ...cess that identifies threats, and vulnerabilities, and results in a formal risk assessment.]]<br> ...ntrol.jpg]][[PCI-12.7:|PCI-12.7 Screen potential employees to minimize the risk of attacks from internal sources.]]<br> ...
    7 KB (988 words) - 19:11, 7 July 2006
  • ...refers to the likelihood of loss, damage, or injury to information assets. Risk is present if a threat can exploit an actual vulnerability to adversely imp ...vulnerability assessments should be rated and prioritized according to the risk and potential impact to Company information assets if exploited.<br> ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • '''Risk Association Control Activities:'''<br> ...
    3 KB (413 words) - 19:02, 4 May 2006
  • ...anized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by the exercise of vul ...am for a commercial enterprise, the processes of calculating the cost of a risk exposure and what the appropriate costs of mitigating those risks should be ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • '''Risk Association Control Activities:'''<br> ...
    3 KB (363 words) - 16:53, 9 April 2007
  • ::'''1. Risk: Availability of critical systems is decreased because system changes (regu ...
    3 KB (447 words) - 13:36, 23 June 2006
  • Although necessary, encryption carries the risk of making data unavailable should anything go wrong with data handling, key ...RSE FACTS:'''</font> Institutions should employ encryption to mitigate the risk of disclosure or alteration of sensitive information in storage and transit ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • '''Risk Association Control Activities:'''<br> ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ==Risk Association Control Activities:== ...s and security staff, and specialist skills in areas such as insurance and risk management.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • '''Risk Association Control Activities:'''<br> ...
    2 KB (353 words) - 18:22, 1 May 2006
  • '''10. Risk: Reactive security monitoring results in data compromise and financial loss ...
    3 KB (421 words) - 20:20, 12 June 2006
  • '''Risk Association Control Activities:'''<br> ...
    3 KB (401 words) - 11:50, 28 March 2008
  • ...risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actuarial assessments ...of the risk, and accepting some or all of the consequences of a particular risk. ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...beginners guide but describes the overall processes, its relationship with risk management and reasons for an organization to implement along with the bene ...cal activities, resources, duties, obligations, threats, risks and overall risk appetite. ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • '''9. Risk: Inappropriate administrative actions are executed without accountability m ...
    3 KB (422 words) - 00:09, 13 June 2006
  • '''Risk Association Control Activities:'''<br> ::'''1. Risk: Business requirements are not met or third parties have inappropriate acce ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • '''Risk Association Control Activities:'''<br> ...
    3 KB (393 words) - 14:35, 21 June 2006
  • ...cess defined by the United States Department of Defense (DoD) for managing risk. DIACAP replaced the former process, known as '''DITSCAP''' ('''Department ...
    2 KB (229 words) - 10:14, 15 April 2012
  • ::*"High-risk" vulnerabilities must be mitigated within seven (7) days.<br> ::*"Medium-risk" vulnerabilities must be mitigated within thirty (30) days.<br> ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • ...hange, but the modification of which could indicate a system compromise or risk of compromise. File integrity monitoring products usually come pre-configur ...
    3 KB (372 words) - 17:59, 7 July 2006
  • ...s often know likely hiding places, the house owner will experience greater risk of a burglary by hiding the key in this way. The owner has in effect added ...ity issue is implemented. Here, the goal is simply to reduce the short-run risk of exploitation of a vulnerability in the main components of the system.<br ...
    11 KB (1,798 words) - 14:44, 14 June 2007
  • ...ves and controls themselves, including a structure for risk assessment and risk management<br> ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...edge of IT security, [http://lazarusalliance.com/services/risk-management/ risk], privacy, [http://lazarusalliance.com/services/policies-governance/ govern ...llence – in any jurisdiction. Lazarus Alliance specializes in IT security, risk, privacy, governance, cyberspace law and compliance leadership solutions an ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...ess processes. The BIA phase also should determine what and how much is at risk by identifying critical business functions and prioritizing them. It should ...
    3 KB (453 words) - 18:45, 25 April 2007
  • '''BS7799 Part 3''' was published in 2005, covering risk analysis and management. It aligns with ISO/IEC 27001. ...
    2 KB (249 words) - 10:56, 27 October 2012
  • ...gher zone. The requirements for each zone should be determined through the risk assessment.<br> '''The risk assessment should include, but is not limited to, the following threats:''' ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • * Proposing methodologies and processes (e.g., risk assessment) subject to management approval<br> * A risk assessment to identify any requirements for specific controls, taking into ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ...ed return on investment, but also significant risk of noncompliance (legal risk).<br> ...it or commercial-centric) dramatically affect factors such as maturity and risk.<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...ation. Therefore, it is important to detail exactly what areas of economic risk the defendant faces. It is conceivable that a computer crime case, which go ...
    3 KB (490 words) - 13:34, 22 February 2009
  • ...is the United States Department of Defense (DoD) process to ensure that [[risk management]] is applied on information systems (IS). DIACAP defines a DoD- ...
    2 KB (322 words) - 10:16, 15 April 2012
  • ...ost and Risk of Complex Matters | Active Management to Reduce the Cost and Risk of Complex Matters]] ...the risk a... | Avoid that feeling of uncertainty: the power to reduce the risk a...]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...m [[Information_Security_Audit | audit]] activities, such as control and [[risk assessment]]s, on a more frequent basis. Technology plays a key role in con ...data assurance (CDA), continuous controls monitoring (CCM), and continuous risk monitoring and assessment (CRMA). ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • [[DS2.3:| 2.3 Supplier Risk Management]]<br> ...
    4 KB (538 words) - 19:08, 14 June 2007
  • '''Risk Association Control Activities:''' ...ot meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ...itable for the roles for which they are considered, in order to reduce the risk of theft, fraud or misuse of facilities. ...onal security policy in the course of their normal work, and to reduce the risk of human error.<br> ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • ...dentify and provide information security protections commensurate with the risk and magnitude of the harm resulting from the unauthorized access, use, disc ...
    3 KB (414 words) - 11:45, 4 June 2010
  • b. The plaintiff was a CHILD WHO IS TOO YOUNG TO KNOW AND APPRECIATE THE RISK INVOLVED. If so, what duty is owed? ii. Does the doctrine of ASSUMPTION OF THE RISK apply? ...
    19 KB (3,149 words) - 10:42, 7 April 2009
  • ...II objectives and procedures provide additional validation as warranted by risk to verify the effectiveness of the institution’s audit function. Tier II qu :1. Review past reports for outstanding issues, previous problems, or high-risk areas with insufficient coverage related to IT. Consider: ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...are first accepted and subsequent Company supporting security, privacy and risk technology and processes are fully implemented. ...s the intended performance of security software, data leakage controls and risk mitigating controls implemented by the Company. Disabling the technology im ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • ...ample Information Security Program Charter''']], the Company will follow a risk management approach to develop and implement Information Security policies, ...are intended to address the specific requirements identified via a formal risk assessment. The standard is also intended to provide a guide for the develo ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • Examiners should conduct risk-focused reviews that assess the overall effectiveness of an organization’s .... However, examiners should be aware that the newer methodologies are more risk focused and involve the completion of project phases in repetitive (iterati ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • ...nizations must understand the need for physical security, conduct thorough risk assessments, and implement physical and environmental controls as required ...
    4 KB (592 words) - 19:28, 14 June 2007
  • ...refers to the formal authorization for system operation and acceptance of risk by an accrediting authority.<br> ::1. Risk Assessment:<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...OUTINE authority is required to register NOT FENCED routines, limiting the risk to introduce routines that may corrupt the database manager's shared memory ...
    4 KB (644 words) - 14:43, 15 May 2007
  • ==Risk Management== ...cepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. na ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...''HORSE FACTS:'''</font> Financial institutions should protect against the risk of malicious code by implementing appropriate controls at the host and netw ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ...ample Information Security Program Charter''']], the Company will follow a risk management approach to develop and implement Information Security policies, ...are intended to address the specific requirements identified via a formal risk assessment. The standard is also intended to provide a guide for the develo ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • [[AI1.2:| 1.2 Risk Analysis Report]]<br> ...
    3 KB (341 words) - 19:07, 14 June 2007
  • ...ormation where a reasonable person would consider that there exists a real risk of significant harm to an individual as a result. * An assessment of the risk of harm to individuals as a result of the loss or unauthorized access or di ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ## Security changes, significant activity, and high-risk functions must be recorded. ...
    3 KB (444 words) - 20:12, 15 January 2014
  • ...raising and recording of changes, assessing the impact, cost, benefit and risk of proposed changes, developing business justification and obtaining approv ...
    4 KB (523 words) - 10:24, 23 April 2010
  • ...delays. For example, in businesses which have higher operational or credit risk loading (that involve credit cards, wealth management), Citibank has moved ...
    5 KB (786 words) - 16:48, 22 March 2007
  • ...refers to the likelihood of loss, damage, or injury to information assets. Risk is present if a threat can exploit an actual vulnerability to adversely imp ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ...Lotus Notes database through Lotus Domino, as well as how to mitigate the risk.<br> ...t topics and provides sample policy statements for low-, medium-, and high-risk environments.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...it reports associated with IT. Refer to [[Risk Assessment and Treatment: | Risk Assessment and Treatment]] for more guidance. Audit management should overs ...intain or improve the efficiency and effectiveness of the institution’s IT risk management, internal controls, and corporate governance.<br> ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...ecurity breach has compromised any personal information and placed them at risk of identity theft. North Carolina consumers where given the right to obtain ...
    3 KB (488 words) - 13:02, 12 November 2011
  • [[File:Risk-Calculator-Flowchart-Generic-MDP-2013122401.jpg]] ...
    3 KB (411 words) - 12:27, 16 October 2014
  • ...dentify and provide information security protections commensurate with the risk and magnitude of the harm resulting from the unauthorized access, use, disc ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ...g enables an organisation to plan future IT expenditure, thus reducing the risk of over-spending and ensuring the revenues are available to cover the predi ...
    6 KB (885 words) - 10:12, 23 March 2007
  • ...ct and secure operation of information processing facilities; minimize the risk of systems failures; protect the integrity of software and information; mai ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...information technology (IT) systems and their performance management and [[risk management]]. The rising interest in IT governance is partly due to complia ...t the necessary systems and IT controls. Whilst [[risk management|managing risk]] and ensuring compliance are essential components of good governance, it i ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...infrastructure (major machinery or computing/network resource). As such, [[risk management]] must be incorporated as part of BCP. ===Threat and Risk Analysis (TRA)=== ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...stom document properties. Identifier metadata, though not necessarily high risk, should be managed if the originator needs to remain anonymous or if docume ...
    4 KB (587 words) - 22:52, 15 March 2010
  • ...nds should be allotted into various areas: policy, awareness and training, risk assessment, technology, and process.<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ...ncing techniques should be used, as deemed necessary, to help minimize the risk and impact of system failures. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • ...refers to the likelihood of loss, damage, or injury to information assets. Risk is present if a threat can exploit an actual vulnerability to adversely imp ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • ...ion of appropriate audit data on operational systems, while minimizing the risk of disruption to business processes. ...
    6 KB (774 words) - 12:41, 25 May 2007
  • ...he industry standards is extremely remote, [[30]] and is far less than the risk of undetected forgery or alteration on paper or of using other less secure ...uch an unsupported published statement in an open system would run a great risk of trusting a phantom or an imposter, or of attempting to disprove a false ...
    22 KB (3,420 words) - 15:18, 3 April 2007
  • ...ct and secure operation of information processing facilities; minimize the risk of systems failures; protect the integrity of software and information; mai ...lan should address the budget, periodic board reporting, and the status of risk management controls.<br> ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • * Constructing a thorough [risk management] on each department handling the nonpublic information ...itutions to take a closer look at how they manage private data and to do a risk analysis on their current processes. No process is perfect, so this has mea ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • ...refers to the likelihood of loss, damage, or injury to information assets. Risk is present if a threat can exploit an actual vulnerability to adversely imp The below guidelines are to be followed when mitigating the risk brought about by the threat of Phishing and Vishing attacks against the Com ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • ...a coverage of compromised business web sites show us that databases are at risk.<br> The risk is so great, in fact, that the world's largest payment networks, Visa and M ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • 2. Does the potential assignment INCREASE THE PROMISOR'S DUTY OR RISK? ...
    8 KB (1,401 words) - 09:26, 7 April 2009
  • ...n but does not shift to such party the burden of proof in the sense of the risk of non persuasion, which remains throughout the trial upon the party on who ...
    6 KB (1,070 words) - 10:18, 11 August 2009
  • ...’s life, or data the misuse of which may lead to discrimination or serious risk to the data subject. Specifically, the definition includes data which may r ...e sufficiency of the security measures will be assessed in relation to the risk involved, potential consequences for data subjects, sensitivity of the data ...
    18 KB (2,869 words) - 17:46, 29 August 2014
  • ...organizations establish [[Compliance and Ethics Programs]] to minimize the risk that the firm steps outside of ethical and legal boundaries. *oversight and management of risk ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • * Intrusion detection and security risk assessment ...ion, possibly filling up your disks. Backup logs periodically to avoid the risk of filling up your disks. The logs should be written to a mount point/direc ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • * Isolate services to reduce the risk that a compromised service could be used to compromise others. ...
    7 KB (1,018 words) - 13:53, 14 May 2007
  • ...tend to charge a greater transaction rate for CNP, because of the greater risk. ...the event of fraud. Merchants can implement these prevention measures but risk losing business if the customer chooses not to use the measures. ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...tions also specify the form of consent. This is a significant class action risk area, and any text messaging (marketing or informational) needs to be caref ...ver, undisclosed online tracking of customer activities poses class action risk. The use of cookies and similar tracking mechanisms should be carefully and ...
    14 KB (2,027 words) - 15:57, 29 August 2014
  • ::*No cost impact (within planned budget or risk transferred).<br> ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • The risk is there when you are using programs to log in over a greatest risk. ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • ...l institutions should review access rights on a schedule commensurate with risk.<br> Depending on the risk associated with the access, authorized internal users should generally rece ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • SSAE 16 engagements are generally performed by audit, risk, and control oriented professionals who have experience in accounting, audi ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ..., and understandable process that specifically addresses the management of risk, incremental acquisitions, and the need to incorporate commercial informati ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...soundness issue due to the reputational, regulatory, legal, and financial risk exposure to the bank for being involved in money laundering schemes or will ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • ...strategy will largely eliminate individual company financial risk or other risk and, therefore, these investors have even less interest in a particular com ...any organizations establish Compliance and Ethics Programs to minimize the risk that the firm steps outside of ethical and legal boundaries. ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...relationship, conceivably placing a significant consulting arrangement at risk, damaging the auditing firm's bottom line. ...ces''': Lending to a firm sends signals to investors regarding the firm's risk. In the case of Enron, several major banks provided large loans to the comp ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...ent systems to comply with the act. (The requirement of risk analysis and risk management implies that the act’s security requirements are a minimum stand ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...are made in accordance with the Change Control Standard; supporting test, risk assessment, and documentation efforts; and participating in restoration eff ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • :::B. Perform risk assessment:<br> ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...engineering, system engineering, project management, software maintenance, risk management, system acquisition, information technology (IT), services, busi ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...pproved, cost effective, business enhancing changes (fixes) - with minimum risk to IT infrastructure. ...nalysis, Manage Contingency Plan Management, Contingency Plan Testing, and Risk Management. ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...ring to think that "potential loss of life" appears in far more IT service risk assessments than one might assume. The RTO and RPO are time intervals, typi ...
    13 KB (2,264 words) - 11:10, 27 October 2012
  • ...the cipher and the best known attacks is too small for comfort. There is a risk that some way to improve such attacks might be found and then the cipher co ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ...ing oneself unnecessarily (a form of information security control known as risk avoidance). This implies that organizations, IT systems and procedures shou ...ng in unauthorized access to sensitive data, can expose individuals to the risk of identity theft. The Privacy Rights Clearinghouse has documented over 900 ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...standards if controls are implemented that ensure there is no significant risk if the password SHOULD be compromised. Accounts MUST comply with the follow ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...their organization, the Auditor should conduct an analysis of the client’s risk and data value. Companies with multiple external users, e-commerce applica ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • : Guarantees that trades will go through by legally assuming the risk of payments not made or securities not delivered. ...generally flow toward the institution funding the transaction and assuming risk in the process. In a credit card transaction, the interchange fee is paid b ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...gh copies of works published before March 1, 1989, must bear the notice or risk loss of copyright protection. The notice has several benefits. It informs t ...
    14 KB (2,130 words) - 06:38, 11 April 2011
  • ...rties have to accept the prospective judgment as binding. This reduces the risk of wasting the Court's time. ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • ...able for “foreseeable harm” when the information it sells places others at risk due to criminal misconduct. The court included in the definition of foresee ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • ...nfusion” test are so factually driven, it is likely some links pose such a risk. As a general proposition, however, it appears that a link that simply uses ...
    27 KB (4,223 words) - 10:08, 13 April 2011
  • ...nitor the quality of the goods being produced by the licensee to avoid the risk of trademark being deemed abandoned by the courts. A trademark license shou ...
    39 KB (6,281 words) - 14:29, 26 April 2011
  • ...commence judicial proceedings against the suspected infringer, without the risk that the alleged infringing goods will disappear into circulation after cus ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...control of a third party, the Court stated, an account holder assumes the risk that the information will be conveyed to the government. Id. According to t ...has authority over the computer. In such cases, all users have assumed the risk that a co-user might discover everything in the computer and might also per ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ...he ''Wall Street Journal'' said that YouTube, MySpace and blogs are put at risk by net neutrality. Swanson says that YouTube streams as much data in three ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...t the fruits of future monitoring by providers, this letter may reduce the risk that any provider monitoring and disclosure will exceed the acceptable limi ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...or knowingly and with reckless disregard of a substantial an unjustifiable risk that such transmission will cause damage to or deny usage of such computer ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...recommended. By following these procedures, agents can greatly reduce the risk that any provider monitoring and disclosure will exceed the acceptable limi ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...computers"). Moreover, attempting to search storage media on-site may even risk damaging the evidence itself in some cases. Modern operating systems contin ...
    138 KB (21,660 words) - 13:18, 5 August 2011
View ( | next 250) (20 | 50 | 100 | 250 | 500)