Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)
  • ==National security systems== ...head of each agency operating or exercising control of a national security system shall be responsible for ensuring that the agency—<br> ...
    709 bytes (103 words) - 10:41, 2 June 2010
  • ==National security systems== ...head of each agency operating or exercising control of a national security system shall be responsible for ensuring that the agency—<br> ...
    709 bytes (103 words) - 21:02, 3 June 2010
  • ==Federal information security incident center== ...— The Director shall ensure the operation of a central Federal information security incident center to—<br> ...
    1 KB (196 words) - 19:07, 3 June 2010
  • == Requirement 11: Regularly test security systems and processes. == ...tems, processes, and custom software should be tested frequently to ensure security is maintained over time and through changes. ...
    3 KB (372 words) - 17:59, 7 July 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.4.2.4.5:|'''SOX.4.2.4.5''']] The OS/400 operating application has a session "Time-Out" function enabled.<br> ...
    6 KB (821 words) - 18:11, 28 August 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.4.2.2.5:|'''SOX.4.2.2.5''']] The WINDOWS operating application has a session "Time-Out" function enabled.<br> ...
    6 KB (779 words) - 13:45, 23 June 2006
  • :a. [[SOX.2.1.1.1:|'''SOX.2.1.1.1''']] The ROUTER operating application has a session "Time-Out" function enabled.<br> :a. [[SOX.2.1.1.3:|'''SOX.2.1.1.3''']] The ROUTER system will not allow identical administrator IDs.<br> ...
    6 KB (729 words) - 13:40, 23 June 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.2.1.3.5:|'''SOX.2.1.3.5''']] The VPN operating application has a session "Time-Out" function enabled.<br> ...
    6 KB (766 words) - 13:42, 23 June 2006
  • ::'''Examine the organization’s system configuration standards for network components and critical servers, includ ...e that they have knowledge of common security parameter settings for their operating systems, database servers, Web servers, and wireless systems.<br> ...
    3 KB (366 words) - 13:52, 28 February 2007
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.2.1.2.5:|'''SOX.2.1.2.5''']] The FIREWALL operating application has a session "Time-Out" function enabled.<br> ...
    6 KB (816 words) - 13:41, 23 June 2006
  • '''DS 5.1 Management of IT Security'''<br> ...rity at the highest appropriate organizational level, so the management of security actions is in line with business requirements. ...
    3 KB (394 words) - 17:12, 22 March 2007
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.4.2.1.5:|'''SOX.4.2.1.5''']] The UNIX operating application has a session "Time-Out" function enabled.<br> ...
    7 KB (895 words) - 13:44, 23 June 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.2.1.5.5:|'''SOX.2.1.5.5''']] The IDS-IPS operating application has a session "Time-Out" function enabled.<br> ...
    7 KB (901 words) - 13:44, 23 June 2006
  • :a. SOX.4.2.1.9: The UNIX operating system application has forensic auditing enabled to enable the monitoring of admin ...otification message produced by the system being tested to verify that the security administrators are being proactively notified of possible access violations ...
    3 KB (422 words) - 00:09, 13 June 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.2.1.4.5:|'''SOX.2.1.4.5''']] The SWITCH operating application has a session "Time-Out" function enabled.<br> ...
    7 KB (901 words) - 13:43, 23 June 2006
  • Implement internal control, security and audit ability measures during configuration, integration and maintenanc ...tection or Prevention System|'''3.2.1.5: Intrusion Detection or Prevention System''']]<br> ...
    1 KB (146 words) - 17:19, 7 June 2006
  • Controls provide reasonable assurance that IT components, as they relate to security, processing and availability, are well protected, would prevent any unautho ...ensing details. A baseline of configuration items should be kept for every system and service as a checkpoint to which to return after changes. ...
    4 KB (506 words) - 18:44, 25 June 2006
  • ...lidate security. Remember, it only takes one hole to compromise the entire security model. The areas covered are just a portion of the constant and never-endin ...ch one to use should be carefully determined by the environment, operating system, and purpose of the DB2 server.<br> ...
    4 KB (644 words) - 14:43, 15 May 2007
  • '''DS 11.6 Security Requirements for Data Management '''<br> Establish arrangements to identify and apply security requirements applicable to the receipt, processing, physical storage and ou ...
    5 KB (649 words) - 18:23, 5 May 2006
  • A '''privilege''' in a computer system is a permission to perform an action. Examples of various privileges includ ...an action. For example, on systems where people are required to log into a system to use it, logging out will not require a privilege. Systems that do not i ...
    2 KB (341 words) - 18:37, 14 June 2007
  • '''DS 5.6 Security Incident Definition'''<br> ...ent process. Characteristics include a description of what is considered a security incident and its impact level. A limited number of impact levels are define ...
    4 KB (548 words) - 14:21, 4 May 2006
  • ...implement, and maintain a best practice, risk management-based information security program.<br> ...implement, and maintain a best practice, risk management-based Information Security Program.<br> ...
    5 KB (705 words) - 11:39, 30 May 2015
  • ...cilities, technology, and user procedures) and ensure that the information security requirements are met by all components. The test data should be saved for a ISO 17799 12.1 Security requirements of information systems.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • ...plied to both new and legacy information systems within the context of the system development life cycle and the organizational enterprise information techno :Categorize the information system and the information resident within that system based on impact. ...
    4 KB (528 words) - 16:58, 28 March 2010
  • '''DS 5.5 Security Testing, Surveillance and Monitoring'''<br> ...ly. IT security should be reaccredited periodically to ensure the approved security level is maintained. A logging and monitoring function enables the early de ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ::'''1. Risk: Insufficient configuration controls can lead to security and availability exposures that may permit unauthorized access to systems a ...']] System infrastructure, including firewalls, routers, switches, network operating systems, servers and other related devices, is properly configured to preve ...
    2 KB (315 words) - 18:38, 25 June 2006
  • ...ging scheme such that audit logs are securely written to a centralized log system. ## The centralized log system shall provide a mechanism for archiving audit logs in accordance with appli ...
    3 KB (444 words) - 20:12, 15 January 2014
  • ...h management and upgrade strategies, risks, vulnerabilities assessment and security requirements.<br> ...anges in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testing so that deployed systems ope ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...op and maintain a risk response to ensure that cost-effective controls and security measures mitigate exposure to risks on a continuing basis. The risk respons All accounts that remain following the comparison to current system accounts should be investigated as they are most likely policy violations a ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...h agency shall have performed an independent evaluation of the information security program and practices of that agency to determine the effectiveness of such ::'''(A)''' testing of the effectiveness of information security policies, procedures, and practices of a representative subset of the agenc ...
    4 KB (682 words) - 19:17, 3 June 2010
  • =='''Logical Security'''== ...n a computer network or a computer workstation. It is a subset of computer security.<br> ...
    7 KB (1,093 words) - 19:00, 5 March 2007
  • ...ort issues and upgrades, periodic review against business needs, risks and security requirements.<br> ...anges in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testing so that deployed systems ope ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...service requirements, service definitions, service level agreements (SLA), operating level agreements (OLA) and funding sources. These attributes are organized ::'''1. Risk: Development and maintenance of system with potential impact to financial reporting bypass processes for identifyi ...
    4 KB (524 words) - 15:03, 25 June 2006
  • ...h agency shall have performed an independent evaluation of the information security program and practices of that agency to determine the effectiveness of such ::'''(A)''' testing of the effectiveness of information security policies, procedures, and practices of a representative subset of the agenc ...
    4 KB (634 words) - 13:00, 4 June 2010
  • ...t Protection Standard, Company protection standards shall include specific security requirements in the following areas: ## Sample Protection Standards must be reviewed by the Information Security Department to ensure vulnerabilities are not introduced into the Company pr ...
    5 KB (681 words) - 21:56, 15 January 2014
  • ...modern computers and receive hundreds of megabytes of data, poses another security headache. A spy (perhaps posing as a cleaning person) could easily conceal ...ains fully present until overwritten at some later time when the operating system reuses the disk space. With even low-end computers being sold with 30 Gigab ...
    4 KB (702 words) - 15:52, 14 June 2007
  • ...is scheme includes details about data ownership, definition of appropriate security levels and protection controls, and a brief description of data retention a ISO 17799 4.1 Information security infrastructure.<br> ...
    3 KB (363 words) - 16:53, 9 April 2007
  • ...user activity and security related events which are reviewed daily by the security administrators.<br> ...revalidations of user group membership and user accounts are performed by security administration.<br> ...
    4 KB (550 words) - 14:34, 1 May 2006
  • [[DS1.4:| 1.4 Operating Level Agreements]]<br> [[DS5:| '''5 Ensure Systems Security''']]<br> ...
    4 KB (538 words) - 19:08, 14 June 2007
  • ==Security requirements of information systems== The objective of this category is to ensure that security is an integral part of the organization's information systems, and of the b ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...ts (NDA), escrow contracts, continued supplier viability, conformance with security requirements, alternative suppliers, penalties and rewards, etc.<br> ...OX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contrac ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...nvironment for IT, aligned with the enterprise’s management philosophy and operating style. These elements include expectations/requirements regarding delivery ...performed and appropriately approved (including account management and IT security). Obtain and examine documents associated with requirements analysis from t ...
    4 KB (580 words) - 18:00, 23 June 2006
  • '''DS 5.2 IT Security Plan '''<br> ...ith appropriate investments in services, personnel, software and hardware. Security policies and procedures are communicated to stakeholders and users. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ...lication, potentially affecting all Internet users with whatever operating system or application the code needs to function. ...ding patch application and security-minded configurations of the operating system (OS), browsers, and other network-aware software. ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ...release of only that part of the software which has been changed. For ex: Security patches to plug bugs in a software *Packaged Release : is a combination of many changes . For ex : an Operating System image containing the applications as well. ...
    2 KB (352 words) - 16:42, 20 March 2007
  • ...he 501(b) guidelines to ensure service providers have implemented adequate security controls to safeguard customer information. :* Require service providers by contract to implement appropriate security controls to comply with the guidelines ...
    6 KB (829 words) - 19:14, 17 April 2007
  • Controls provide reasonable assurance that system changes of financial reporting significance are authorized and appropriatel ...intenance and patches) for changes to applications, procedures, processes, system and service parameters, and the underlying platforms.<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • Oracle's security by default is not extremely good. For example, Oracle will allow users to c Guest default accounts, which allow anonymous users to sign on the system, MUST be disabled, changed, or otherwise properly configured to prevent acc ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...tackers are unlikely to find them. The technique stands in contrast with [[security by design]], although many real-world projects include elements of both str ...aphy was disturbing to the US government, which seems to have been using a security through obscurity analysis to support its opposition to such work. ...
    11 KB (1,798 words) - 14:44, 14 June 2007
  • * Systems documentation for computer system allegedly compromised ...ilures, slowdowns, etc. of the Record Update Section, the Criminal History System [[CHS]] as a whole, or any part thereof, or any investigations or analyses ...
    5 KB (816 words) - 15:41, 22 February 2009
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)