Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)
  • ==Sources of standards for Information Security== ...[[Information Security Management System]]s" are of particular interest to information security professionals.<br> ...
    2 KB (287 words) - 14:29, 8 March 2007
  • ==Sample Information Systems and Technology Security Policy== ...protection of the confidentiality, integrity, and availability of Company information assets. ...
    4 KB (465 words) - 15:46, 13 January 2014
  • ==Service Desk Management== ...called for in IT Service Management (ITSM) as defined by the [[Information Technology Infrastructure Library]] (ITIL). It is intended to provide a Single Point o ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ...rces under sub-chapter I of chapter 35 of this title, or the disclosure of information to Congress or the Comptroller General of the United States. ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • ==IT Management Booklet== ...risk management processes to ensure effective information technology (IT) management.<br> ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ...rces under sub-chapter I of chapter 35 of this title, or the disclosure of information to the Congress or the Comptroller General of the United States. While this ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • =='''Asset Management'''== ...It is about the management, control and protection of '''all''' aspects of Information / Data in whatever form for example paper records or X-Ray Film and fiche. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ==IT Risk Management Process== ...essments. Senior management should identify, measure, control, and monitor technology to avoid risks that threaten the safety and soundness of an institution.<br ...
    4 KB (528 words) - 16:58, 28 March 2010
  • '''PO 3.4 Technology Standards'''<br> ...measure compliance with these standards and guidelines. This forum directs technology standards and practices based on their business relevance, risks and compli ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...nal standard for [[Compliance#ITIL_IT_Infrastructure_Library: | IT Service Management]]. It was developed in 2005, by the BSI Group. It is based on and intended ...ogether, these form a top-down framework to define the features of service management processes that are essential for the delivery of high quality services.<br> ...
    2 KB (298 words) - 14:25, 23 April 2010
  • ==Change Management== ...anges (fixes) - with minimum risk to IT infrastructure. The goal of Change Management is to ensure that standardized methods and procedures are used for efficien ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ....316). Policies provide the necessary authority to establish and implement technology- and solution-specific standards.<br> :1. [[Sample_Information_Security_Program_Charter:|'''Sample HIPAA Information Security Program Charter''']]<br> ...
    5 KB (614 words) - 16:46, 25 July 2006
  • Policies are the broad rules for ensuring the protection of information assets, and for implementing a security strategy or program. Generally brie :[[Sample Information Security Program Charter:|'''Sample Information Security Program Charter''']]<br> ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...ncorporate the consequences of these trends into the development of the IT technology infrastructure plan.<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (290 words) - 17:49, 25 April 2007
  • ==Configuration Management== ...rocess''' that tracks all of the individual Configuration Items (CI) in an information system which may be as simple as a single server, or as complex as the enti ...
    4 KB (570 words) - 16:12, 23 March 2007
  • ...sually created by an organization's [[Chief Information Officer]] (CIO) or technology manager and should be designed to support the organization's overall [[busi One of the principal purposes of creation of a technology strategy is to create consensus and stakeholder buy-in. There are many met ...
    5 KB (777 words) - 17:59, 16 February 2007
  • [[Organizing Information Security:|'''Organizing Information Security''']]<br> [[Asset Management:|'''Asset Management''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as ...
    6 KB (885 words) - 10:12, 23 March 2007
  • '''Policies''' are the broad rules for ensuring the protection of information assets, and for implementing a security strategy or program. Generally brie ...s to a companies Board of Directors. Standards are approved by a companies technology review board.<br> ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ==Sample End User Computing and Technology Policy== ...tablishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipment. ...
    4 KB (507 words) - 14:58, 21 January 2014
  • ...and tribal governments, and other persons resulting from the collection of information by or for the Federal Government;<br> ...sure the greatest possible public benefit from and maximize the utility of information created, collected, maintained, used, shared and disseminated by or for the ...
    3 KB (414 words) - 10:37, 1 June 2010
  • ...that are needed to create, implement, and maintain a risk management-based Information Security Program that complies with SOX Section 404.<br> ...cies, and standards) that are needed to create, implement, and maintain an Information Security Program that complies with SOX Section 404.<br> ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ...799]], "Information Technology - Code of practice for information security management." in 2000. [[ISO/IEC 17799]] was then revised in June 2005 and finally inc ...security management system]] (ISMS), referring to the information security management structure and controls identified in BS 7799-2, which later became [[ISO/IE ...
    2 KB (249 words) - 10:56, 27 October 2012
  • ...ves, or from programs, projects or service improvement initiatives. Change Management can ensure standardized methods, processes and procedures are used for all ==Change management in development projects== ...
    4 KB (523 words) - 10:24, 23 April 2010
  • '''DS 5.7 Protection of Security Technology '''<br> Ensure that important security-related technology is made resistant to tampering and security documentation is not disclosed ...
    3 KB (377 words) - 18:52, 4 May 2006
  • ...chnology - Security techniques - Code of practice for information security management''. The current standard is a revision of the version published in [[2000]], ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...mer process, known as '''DITSCAP''' ('''Department of Defense Information Technology Security Certification and Accreditation Process'''), in 2006. ...at will maintain the [[Information Assurance]] (IA) posture of the Defense Information Infrastructure (DII) throughout the [[Systems Development Life Cycle|system ...
    2 KB (229 words) - 10:14, 15 April 2012
  • ...Framework (MOF) 4.0''' is a series of guides aimed at helping information technology (IT) professionals establish and implement reliable, cost-effective service ...| governance]], [[Risk_management | risk]], and [[compliance]] activities; management reviews, and Microsoft Solutions Framework (MSF) best practices.<br> ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...to create, implement, and maintain a best practice, risk management-based information security program.<br> ...to create, implement, and maintain a best practice, risk management-based Information Security Program.<br> ...
    5 KB (705 words) - 11:39, 30 May 2015
  • '''(a)''' The Director shall oversee agency information security policies and practices, by—<br> :'''(1)''' promulgating information security standards under section 11331 of title 40;<br> ...
    3 KB (414 words) - 11:45, 4 June 2010
  • ...nts to address: a definition of services; performance measurement; problem management; customer duties; warranties; disaster recovery; termination of agreement.< *[[IT Service Management]] ...
    3 KB (527 words) - 16:06, 22 March 2007
  • ...riate training of system users or owners where the systems house sensitive information. It has been superseded by the [[FISMA | Federal Information Security Management Act of 2002]] ...
    1 KB (168 words) - 11:37, 23 May 2010
  • ==Information Security Policy== ...ective of this category is to provide management direction and support for information security in accordance with business requirements and all relevant laws, re ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...e majority of their data processing, core processing, or other information technology systems or services are still expected to implement an appropriate BCP addr ...cial institutions are moving toward shorter recovery periods and designing technology recovery solutions into business processes. These technological advancement ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ==Information Technology Management Reform Act of 1996== ...t of 1996 - Title LI (sic): Responsibility for Acquisitions of Information Technology.'''<br> ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...ine the nature of the impact— positive, negative or both—and maintain this information.<br> ...list to a control list of exceptions that has been previously certified by management. Any accounts that remain should be investigated as they are most likely po ...
    3 KB (459 words) - 17:56, 21 June 2006
  • '''PO 5.5 Benefit Management'''<br> ...ibution, appropriate actions should be defined and taken. Where changes in Information Technologies contribution impact the program, or where changes to other rel ...
    3 KB (475 words) - 13:09, 23 June 2006
  • =='''Sample On Premise Wireless Access Technology Guideline'''== ...jectives for establishing specific standards on the assessment and ongoing management of wireless technologies utilized for the extension of network infrastructu ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ...1)''' the term '''information security''' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification ...st improper information modification or destruction, and includes ensuring information non-repudiation and authenticity; ...
    3 KB (368 words) - 00:50, 1 June 2010
  • ..., people skills and competencies, organization structure, and the enabling technology. ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...software, facilities, technology, and user procedures) and ensure that the information security requirements are met by all components. The test data should be sa Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • Ensure that IT management, working with the business, defines a balanced set of performance objective * Future-oriented activities, for example, emerging technology, reusable infrastructure, business and IT personnel skill sets.<br> ...
    3 KB (362 words) - 12:33, 4 May 2006
  • '''DS 11.3 Media Library Management System '''<br> ...r [[AES | Advanced Encryption Standard]] (AES) 256-bit with associated key management processes and procedures.''' ...
    3 KB (401 words) - 11:50, 28 March 2008
  • ...t considers changes in the competitive environment, economies of scale for information systems staffing and investments, and improved interoperability of platform Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (351 words) - 17:03, 21 June 2006
  • [[Category:Information technology management|Governance]] [[Category:Information technology governance| ]] ...
    2 KB (235 words) - 09:48, 23 October 2012
  • '''(a)''' In General.— The Director shall oversee agency information security policies and practices, including—<br> ...g the implementation of policies, principles, standards, and guidelines on information security, including through ensuring timely agency adoption of and complian ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ...shed procedures across the organization to protect information systems and technology from computer viruses. ...
    2 KB (279 words) - 19:02, 25 June 2006
  • ...ation of the costs of delivering IT capabilities and services. Ensure that technology investments are standardized to the greatest extent possible to avoid the i Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    3 KB (393 words) - 14:35, 21 June 2006
  • ...anagement procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities assessment and security requ ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...ormation requirements, IT configuration, information risk action plans and information security culture into an overall IT security plan. The plan is implemented ...y policy exists and has been approved by an appropriate level of executive management. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)