Search results

Jump to navigation Jump to search
  • ==Sources of standards for Information Security== ...[[Information Security Management System]]s" are of particular interest to information security professionals.<br> ...
    2 KB (287 words) - 14:29, 8 March 2007
  • '''ME 4.7 Independent Assurance'''<br> ...timely independent assurance about the compliance of IT with its policies, standards and procedures, as well as with generally accepted practices.<br> ...
    2 KB (300 words) - 13:39, 4 May 2006
  • '''BS 7799''' was a standard originally published by British Standards Institution (BSI) in 1995. It was written by the United Kingdom Government' ...n revised in June 2005 and finally incorporated in the ISO 27000 series of standards as [[ISO/IEC 27002]] in July 2007. ...
    2 KB (249 words) - 10:56, 27 October 2012
  • '''PO 8.2 IT Standards and Quality Practices'''<br> Identify and maintain standards, procedures and practices for key IT processes to guide the organization in ...
    3 KB (460 words) - 16:08, 21 June 2006
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.''' :::a. SOX.1.15: Controls provide reasonable assurance that business requirements are gathered and approved during the development ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ...T objectives and direction are communicated throughout the enterprise. The information communicated should encompass a clearly articulated mission, service object ...ilities (such as information security staff, systems administration staff, information asset owners, etc.) are not informed of or trained in their security respon ...
    3 KB (442 words) - 18:58, 1 May 2006
  • '''PO 8.3 Development and Acquisition Standards'''<br> ...e standards; interoperability; system performance efficiency; scalability; standards for development and testing; validation against requirements; test plans; a ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ...systems and processes used for those purposes. While focused dominantly on information in digital form, the full range of IA encompasses not only digital but also Information assurance as a field has grown from the practice of [[information security]] which in turn grew out of practices and procedures of [[computer ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...roviders have implemented adequate security controls to safeguard customer information. ...ear understanding of the provider’s security incidence response policy and assurance that the provider will communicate security incidents promptly to the insti ...
    6 KB (829 words) - 19:14, 17 April 2007
  • ...pment, taking into account the organization’s technological directions and information architecture, and have the design specifications approved to ensure that th ...ity risks are introduced by technical designs incompatible with enterprise standards.'''<br> ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.''' :::a. SOX.1.15: Controls provide reasonable assurance that business requirements are gathered and approved during the development ...
    3 KB (394 words) - 17:12, 22 March 2007
  • Develop and follow a set of procedures and standards that is consistent with the business organization’s overall procurement pro ...ity risks are introduced by technical designs incompatible with enterprise standards.'''<br> ...
    3 KB (442 words) - 13:59, 23 June 2006
  • :::a. SOX.2.0.2: Controls provide reasonable assurance that IT daily operation procedures are executed.<br> ...ccess to applications because the database passwords do not meet corporate standards.'''<br> ...
    4 KB (550 words) - 14:34, 1 May 2006
  • ...software, facilities, technology, and user procedures) and ensure that the information security requirements are met by all components. The test data should be sa Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • ::'''1. Risk: Controls provide reasonable assurance that policies and procedures that define required acquisition and maintenan ...ity risks are introduced by technical designs incompatible with enterprise standards.''' ...
    3 KB (471 words) - 12:32, 23 June 2006
  • [[PO2:| '''2 Define the Information Architecture''']]<br> [[PO2.1:| 2.1 Enterprise Information Architecture Model]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...nization’s ability to identify, acquire, install, and maintain appropriate information technology systems.” The process includes the internal development of soft ...o deliver products or services, maintain a competitive position, or manage information.<br> ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • ...tled ''Information technology - Security techniques - Code of practice for information security management''. ...erwise unchanged) in 2007 to align with the other [[ISO/IEC 27000-series]] standards. ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...rting on Controls at a Service Organization, was finalized by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA) in ...res that all user organizations and their auditors have access to the same information and in many cases this will satisfy the user auditor's requirements.<br> ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • '''Federal Information Security Management Act (FISMA)''' ...uidelines to support the implementation of and compliance with the Federal Information Security Management Act including: ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ::'''1. Risk: Controls provide reasonable assurance that the systems are appropriately tested and validated prior to being plac Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.'''<br> ::'''2. Risk: Controls provide reasonable assurance that the systems are appropriately tested and validated prior to being plac ...
    3 KB (497 words) - 14:57, 23 June 2006
  • ...ed in accordance with design specifications, development and documentation standards and quality requirements. Approve and sign off on each key stage of the app ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...
    6 KB (804 words) - 12:14, 23 June 2006
  • '''BS 25999''' is the British Standards Institution (BSI)'s standard in the field of [[Business continuity planning ...s a Business Continuity Management (BCM) standard published by the British Standards Institution (BSI). ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ::'''2. Risk: Controls provide reasonable assurance that the systems are appropriately tested and validated prior to being plac Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • Controls provide reasonable assurance that financial reporting systems and subsystems are appropriately secured t ...ormation requirements, IT configuration, information risk action plans and information security culture into an overall IT security plan. The plan is implemented ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.'''<br> ::'''2. Risk: Controls provide reasonable assurance that the systems are appropriately tested and validated prior to being plac ...
    4 KB (538 words) - 13:16, 23 June 2006
  • =='''Information Security Presentation Samples'''== :Holistic Operational Readiness Security Evaluation - Comprehensive information security control and risk assessment guidance for the enterprise demystifie ...
    5 KB (653 words) - 12:45, 25 April 2007
  • '''AI 6.1 Change Standards and Procedures'''<br> Controls provide reasonable assurance that system changes of financial reporting significance are authorized and ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...pecific instructions and requirements for life cycle management of Company information systems, including hardware and software.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...erform work on Company premises or who have been granted access to Company information or systems, are covered by this standard and must comply with associated gu ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...oint of view, "digital signature" means the result of applying to specific information certain specific technical processes described below. The historical legal ...signature. These Guidelines use "digital signature" only as it is used in information security terminology, as meaning the result of applying the technical proce ...
    22 KB (3,420 words) - 15:18, 3 April 2007
  • ...r abnormal activities that may need to be addressed. Access to the logging information is in line with business requirements in terms of access rights and retenti :::a. SOX.1.14: Controls provide reasonable assurance that systems with potential impact to financial reporting are developed and ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...tion’s operations, including risks in new products, emerging technologies, information systems, and electronic banking.<br> * Inappropriate user access to information systems ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...and business processes depend, requires a consistent approach to security standards in the areas of database configurations, maintenance, and administration. I * Access standards ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...e sensitivity of the data contained or accessible through the zone and the information technology components in the zone. For instance, data centers may be in the ...ers, surveillance equipment, or other similar devices. Since access to key information system hardware and software should be limited, doors and windows must be s ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...particularly authentication credentials and the transmission of sensitive information. It can be used throughout a technological environment, including the oper ...h sufficient to protect information from disclosure until such time as the information’s disclosure poses no material threat. For instance, authenticators should ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • ...line business running. Unauthorized modification of even a single piece of information within a database can lead to reputation damage, litigation, or the collaps ...ite the sensitive nature of these database systems, business, and customer information typically contained within databases, first-hand experience and reoccurring ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...idelines and constraints for the SCM process. Guidelines can come forth of standards or preferences from the customers. Constraints may be corporate policies or ...fairs. An automated system will be used to capture and report all relevant information during the life cycle of a software configuration item. ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ...it function. Tier II questions correspond to the Uniform Rating System for Information Technology (URSIT) rating areas and can be used to determine where the exam ::* Audit information and summary packages submitted to the board or its audit committee ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...ive Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national identifiers for provid ...ation provisions also address the security and privacy of health data. The standards are meant to improve the efficiency and effectiveness of the nation's healt ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...h of both mathematics and computer science, and is affiliated closely with information theory, [[computer security]], and engineering. Cryptography is used in man ...] (AES) are block cipher designs which have been designated [[cryptography standards]] by the US government (though DES's designation was finally withdrawn afte ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • ...ICSA), is a high ranking professional who is trained to uphold the highest standards of corporate governance, effective operations, compliance and administratio ...y can help shareholders exercise their rights by effectively communicating information that is understandable and accessible and encouraging shareholders to parti ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...mechanism includes numerous controls to safeguard and limits access to key information system assets at all layers in the network stack. This section addresses l ...um required for work to be performed exposes the institution’s systems and information to a loss of confidentiality, integrity, and availability. Accordingly, th ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ===Title III: Computer Maintenance Competition Assurance Act=== **The information derived from the security testing is used primarily to promote the security ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...ICSA), is a high ranking professional who is trained to uphold the highest standards of corporate governance, effective operations, compliance and administratio ...y can help shareholders exercise their rights by effectively communicating information that is understandable and accessible and encouraging shareholders to parti ...
    45 KB (6,604 words) - 15:20, 15 April 2010