Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • =='''Technical Standards Guides'''== ...iled descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirement ...
    4 KB (512 words) - 12:05, 25 July 2006
  • 3 KB (363 words) - 11:45, 29 August 2006
  • =='''Technical Standards Guides'''== ...iled descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirement ...
    5 KB (597 words) - 15:27, 16 November 2006
  • ==Sources of standards for Information Security== ...d that coordinates the system. The ISO is the world's largest developer of standards. The ISO-15443: "Information technology - Security techniques - A framewor ...
    2 KB (287 words) - 14:29, 8 March 2007
  • 4 KB (644 words) - 14:43, 15 May 2007
  • ...sset Management Standard''']] defines objectives for establishing specific standards for properly managing the Company Information Technology infrastructure, in ...s for establishing and maintaining legal evidence retention and protection standards for Company physical and electronic data stores, network devices, servers, ...
    9 KB (1,213 words) - 13:20, 9 March 2009
  • =='''Oracle Database Asset Protection Standards:'''== It is recommended that the accepted standards developed by the company be applied to the default profile to eliminate any ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...and business processes depend, requires a consistent approach to security standards in the areas of database configurations, maintenance, and administration. I * Access standards ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • 7 KB (1,018 words) - 13:53, 14 May 2007

Page text matches

  • =='''Technical Standards Guides'''== ...iled descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirement ...
    5 KB (597 words) - 15:27, 16 November 2006
  • =='''Technical Standards Guides'''== ...iled descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirement ...
    4 KB (512 words) - 12:05, 25 July 2006
  • ==Sources of standards for Information Security== ...d that coordinates the system. The ISO is the world's largest developer of standards. The ISO-15443: "Information technology - Security techniques - A framewor ...
    2 KB (287 words) - 14:29, 8 March 2007
  • ...ards for Privacy of Individually Identifiable Health Information, Security Standards for the Protection of Electronic Protected Health Information, and General ...
    400 bytes (47 words) - 13:15, 15 June 2007
  • ...1.3:]], [[PCI-1.1.4:]], [[PCI-1.1.5:]], and [[PCI-1.1.6:]], to verify that standards are complete. ...
    242 bytes (27 words) - 12:18, 16 June 2010
  • ...Information Security Policy Framework templates (for example, policies and standards) that are needed to create, implement, and maintain a risk management-based ...ion Security Policy templates (for example, Program Charter, policies, and standards) that are needed to create, implement, and maintain an Information Security ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ...s from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain an Information ...le Policy Framework templates (for example, Program Charter, policies, and standards) that are needed to create, implement, and maintain an Information Security ...
    2 KB (260 words) - 13:17, 15 June 2007
  • :'''Establish firewall configuration standards that include:'''<br> ...n standards and other documentation specified below to obtain evidence the standards are complete. Also obtain a copy of the following documentation: ...
    2 KB (278 words) - 21:22, 2 March 2007
  • ...nology Security Policy define Company objectives for establishing specific standards on the protection of the confidentiality, integrity, and availability of Co ...c perspective that must be addressed in the subordinate control documents; standards, procedures, and supporting documentation are described as follows.<br> ...
    4 KB (465 words) - 15:46, 13 January 2014
  • :'''Establish firewall configuration standards that include:'''<br> ...n standards and other documentation specified below to obtain evidence the standards are complete. Also obtain a copy of the following documentation: ...
    2 KB (290 words) - 21:22, 2 March 2007
  • :'''Establish firewall configuration standards that include:'''<br> ...n standards and other documentation specified below to obtain evidence the standards are complete. Also obtain a copy of the following documentation: ...
    2 KB (315 words) - 21:21, 2 March 2007
  • :::a. [[SOX.2.0.18:|'''SOX.2.0.18''']] A framework of security standards has been developed that supports the objectives of the security policy. Obtain a copy of the security standards and: ...
    3 KB (360 words) - 16:59, 25 June 2006
  • ...tion provides sample Policy Framework templates (for example, policies and standards) that are needed to create, implement, and maintain an Information Security ...ty Program that complies with GLBA. Additional best practices policies and standards are provided for financial organizations that wish to exceed GLBA requireme ...
    2 KB (263 words) - 12:52, 14 July 2006
  • '''BS 7799''' was a standard originally published by British Standards Institution (BSI) in 1995. It was written by the United Kingdom Government' ...n revised in June 2005 and finally incorporated in the ISO 27000 series of standards as [[ISO/IEC 27002]] in July 2007. ...
    2 KB (249 words) - 10:56, 27 October 2012
  • :[[Information_Security_Standards_Sources:|'''Sources of Information Security Standards''']]<br> ...to some international sites that provide many of the information security standards we should be familiar with.<br> ...
    1,015 bytes (132 words) - 14:09, 8 March 2007
  • :'''(1)''' promulgating information security standards under section 11331 of title 40;<br> :'''(2)''' overseeing the implementation of policies, principles, standards, and guidelines on information security;<br> ...
    3 KB (414 words) - 11:45, 4 June 2010
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...quired for each system ID. Password configuration is based on Corporate IT standards.<br> ...
    3 KB (405 words) - 00:10, 13 June 2006
  • ...ion and Classification Policy defines objectives for establishing specific standards to define, identify, classify, and label information assets.<br> :The Asset Protection Policy defines objectives for establishing specific standards for providing an appropriate degree of confidentiality, integrity, and avai ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...chnology (NIST, At the time named National Bureau of Standards) to develop standards of minimum acceptable practices with the help of the National Security Agen ...
    1 KB (168 words) - 11:37, 23 May 2010
  • ...on of the Information Security Program Charter and associated policies and standards.<br> ...ion security awareness training for management should cover all topics and standards for employees or Users, as well as the following policies:<br> ...
    5 KB (662 words) - 17:54, 25 July 2006
  • ...Security Program Charter by defining objectives for establishing specific standards to properly classify and label sensitive information assets such as custome ...Security Program Charter by defining objectives for establishing specific standards to ensure the security and confidentiality of customer information, as well ...
    4 KB (535 words) - 16:51, 25 July 2006
  • '''PO 3.4 Technology Standards'''<br> ...pliance with these standards and guidelines. This forum directs technology standards and practices based on their business relevance, risks and compliance with ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...f Management and Budget or the Director thereof, the National Institute of Standards and Technology, or the head of any agency, with respect to the authorized u ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • ...er:|'''Information Security Program Charter''']]. and associated policies, standards, guidelines, and procedures. ...arter:|'''Information Security Program Charter''']] and relevant policies, standards and guidelines must be properly communicated to Company corporate and busin ...
    3 KB (418 words) - 19:53, 14 January 2014
  • ...subscribe to alert services freely available on the Internet). Update your standards to address new vulnerability issues.<br> ...r security vulnerability information and updating the system configuration standards reviewed in Requirement 2 as new vulnerability issues are found.<br> ...
    2 KB (303 words) - 18:22, 28 February 2007
  • Katz, Non-Warrant Search Challenges US v. Ross: Evolving Standards of Warrantless Searches, 74 J Crim L and Criminology 172 (1983). ...
    413 bytes (60 words) - 03:02, 5 March 2009
  • ..., including through ensuring timely agency adoption of and compliance with standards promulgated under section 11331 of title 40;<br> :'''(2)''' requiring agencies, consistent with the standards promulgated under such section 11331 and the requirements of this subchapte ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ...f Management and Budget or the Director thereof, the National Institute of Standards and Technology, or the head of any agency, with respect to the authorized u ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • ==Policies, Standards, and Guidelines== ...ise but do not have a reportable status to a companies Board of Directors. Standards are approved by a companies technology review board.<br> ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ...olicy framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk m ...olicy Framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk m ...
    5 KB (705 words) - 11:39, 30 May 2015
  • '''4. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (729 words) - 13:40, 23 June 2006
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (766 words) - 13:42, 23 June 2006
  • ...Develop configuration standards for all system components. Make sure these standards address all known security vulnerabilities and industry best practices.'''< ...
    2 KB (283 words) - 17:00, 26 June 2006
  • ...mple Information Security Program Charter''']] and associated policies and standards.<br> ...mple Information Security Program Charter''']] and associated policies and standards.<br> ...
    5 KB (728 words) - 14:07, 1 May 2010
  • ...s from the Best Practice Policy Framework library (for example, policy and standards controls)that are needed to create, implement, and maintain an Information ...el of protection. This section provides templates for Information Security standards that are required to comply with ISO Asset Classification and Control objec ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...oftware and data. This section provides templates for Information Security standards that are required to comply with ISO Systems Development and Maintenance ob ...ions and requirements for establishing and maintaining baseline protection standards for Company network devices, servers, and desktops.<br> ...
    5 KB (613 words) - 18:14, 25 July 2006
  • ...ary authority to establish and implement technology- and solution-specific standards.<br> ...Security Program Charter by defining objectives for establishing specific standards to properly classify and label sensitive information assets such as all ele ...
    5 KB (614 words) - 16:46, 25 July 2006
  • ...ts; ensure compliance of systems with organizational security policies and standards; and maximize the effectiveness of and to minimize interference to or from ==Identification of Applicable Statutes, Regulations and Certification Standards== ...
    6 KB (774 words) - 12:41, 25 May 2007
  • '''7. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (779 words) - 13:45, 23 June 2006
  • ::'''Examine the organization’s system configuration standards for network components and critical servers, including any wireless access ...ommon security parameter settings are included in the system configuration standards.<br> ...
    3 KB (366 words) - 13:52, 28 February 2007
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...quired for each system ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (821 words) - 18:11, 28 August 2006
  • :'''(4)''' consult with the National Institute of Standards and Technology, agencies or offices operating or exercising control of nati ...Federal information security incident center to the extent consistent with standards and guidelines for national security systems, issued in accordance with law ...
    1 KB (196 words) - 19:07, 3 June 2010
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (816 words) - 13:41, 23 June 2006
  • '''PO 8.2 IT Standards and Quality Practices'''<br> Identify and maintain standards, procedures and practices for key IT processes to guide the organization in ...
    3 KB (460 words) - 16:08, 21 June 2006
  • ...policy area. Information Security procedures describe how to implement the standards. ...ure that the Information Security Program Charter and associated policies, standards, guidelines, and procedures are properly communicated and understood by est ...
    2 KB (316 words) - 15:19, 13 January 2014
  • ...the current network diagram is consistent with the firewall configuration standards. ...
    2 KB (287 words) - 10:55, 4 July 2015
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    7 KB (901 words) - 13:44, 23 June 2006
  • *15: Compliance - ensuring conformance with information security policies, standards, laws and regulations ...ection outlines a risk assessment process although there are more specific standards covering this area such as ISO Technical Report TR 13335 GMITS Part 3 - Gui ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...ions and requirements for establishing and maintaining baseline protection standards for Company network devices, servers, and desktops. ## Protection standards must be established and implemented for all computing and network resources ...
    5 KB (681 words) - 21:56, 15 January 2014
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...quired for each system ID. Password configuration is based on Corporate IT standards.<br> ...
    7 KB (895 words) - 13:44, 23 June 2006
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)