Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ==FFIEC Information Technology Examination Handbook Executive Summary== ...ve effort of the FFIEC’s five member agencies, has replaced the 1996 FFIEC Information Systems Examination Handbook (1996 Handbook). ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...1)''' The term '''information security''' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification ...st improper information modification or destruction, and includes ensuring information non-repudiation and authenticity; ...
    2 KB (327 words) - 00:58, 1 June 2010
  • ...financial resources expended by persons to generate, maintain, or provide information to or for a Federal agency, including the resources expended for—<br> :'''(B)''' acquiring, installing, and utilizing technology and systems; ...
    5 KB (795 words) - 00:35, 1 June 2010
  • ...bility to identify, acquire, install, and maintain appropriate information technology systems.” The process includes the internal development of software applic ...o deliver products or services, maintain a competitive position, or manage information.<br> ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • =='''Vulnerability Management Standard'''== ...jectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • '''Federal Information Security Management Act (FISMA)''' ...the implementation of and compliance with the Federal Information Security Management Act including: ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ...hanges to business processes, technology and skills are assessed. Business management, supported by the IT function, should assess the feasibility and alternativ Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (357 words) - 14:15, 3 May 2006
  • ...igence Directives.''' Protecting Special Access Program Information Within Information Systems policy excerpt: [[Media:JAFAN_6_3.pdf]]<br> :'''Avoid Session Management Pitfalls:''' [[Media:session-management-security.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • == Requirement 12: Maintain a policy that addresses information security. == ::[[Image:Key-control.jpg]][[PCI-12.3.1:|PCI-12.3.1 Explicit management approval.]]<br> ...
    7 KB (988 words) - 19:11, 7 July 2006
  • ...virus control) across the organization to protect information systems and technology from malware (viruses, worms, spy-ware, spam, internally developed fraudule ...shed procedures across the organization to protect information systems and technology from computer viruses. ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ==Security requirements of information systems== ...egory is to ensure that security is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...mation technology (IT) systems and their performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiat ...bility framework to encourage desirable behavior in the use of information technology."''<br> ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Standard''']], and provides specific instructions and requirements for esta ...
    9 KB (1,213 words) - 13:20, 9 March 2009
  • ...rization controls over the initiation of transactions, resulting financial information may not be reliable. :::a. [[SOX.2.7.10:|'''SOX.2.7.10''']] Management protects sensitive information— logically and physically, in storage and during transmission—against unaut ...
    5 KB (721 words) - 11:49, 28 March 2008
  • ==Incident Management== ...| Service Level Management]] process area. The first goal of the incident management process is to restore a normal service operation as quickly as possible and ...
    9 KB (1,371 words) - 16:40, 23 May 2007
  • ...odies, such as an IT strategy committee, to provide strategic direction to management relative to IT, ensuring that the strategy and objectives are cascaded down Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...ings are well known in hacker communities and easily determined via public information.<br> ...ngs, and disabling of SSID broadcasts. Enable Wi-Fi Protected Access (WPA) technology for encryption and authentication when WPA-capable.]]<br> ...
    2 KB (283 words) - 17:00, 26 June 2006
  • ...bjective of this category is to ensure the correct and secure operation of information processing facilities.<br> ==Communications and Operations Management== ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...chnology - Security techniques - Code of practice for information security management''. ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...s granted to some users increases the risk of accidental damage or loss of information and systems.<br> Financial institutions should have a process to verify job application information on all new employees. The sensitivity of a particular job or access level m ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • [[PO1.1:| 1.1 IT Value Management]]<br> [[PO1.6:| 1.6 IT Portfolio Management]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...sider include impact analysis, cost/benefit justification and requirements management.<br> ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    3 KB (425 words) - 13:19, 23 June 2006
  • ...systems and processes used for those purposes. While focused dominantly on information in digital form, the full range of IA encompasses not only digital but also Information assurance as a field has grown from the practice of [[information security]] which in turn grew out of practices and procedures of [[computer ...
    7 KB (983 words) - 10:41, 15 April 2012
  • '''EVALUATION OF CONTROLS IN INFORMATION SYSTEMS (IS) QUESTIONNAIRE'''<br> ...estion. This can generally be achieved if the company involves an internal information systems auditor in the question answering process. Specific “Guidance Point ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ...res that all user organizations and their auditors have access to the same information and in many cases this will satisfy the user auditor's requirements.<br> ...ol oriented professionals who have experience in accounting, auditing, and information security. A SSAE 16 engagement allows a service organization to have its co ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...r abnormal activities that may need to be addressed. Access to the logging information is in line with business requirements in terms of access rights and retenti ...ngs, and disabling of SSID broadcasts. Enable Wi-Fi Protected Access (WPA) technology for [[Encryption | encryption]] and authentication when WPA-capable.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ::Information Security Staff ::Interested Executive and Business Unit Management. ...
    2 KB (315 words) - 18:46, 25 September 2006
  • ...tablishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipment. Company information and telecommunications systems and equipment, including Internet, electroni ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ...protection and management objectives, and define acceptable use of Company information assets.<br> ...iality, integrity, and availability of Company information assets. Company information assets are defined in the [[Sample Asset Identification and Classification ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...ly dependent on IT and mediate between imperatives of the business and the technology, so agreed priorities can be established.<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...d sites supporting the Company, or who have been granted access to Company information or systems, are covered by this policy and must comply with associated stan ...through systems owned or administered by or on the behalf of the Company. Information Assets include all personal, private, or financial data about employees, cl ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm r :::'''(i)''' information collected or maintained by or on behalf of the agency; and<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm r :::'''(i)''' information collected or maintained by or on behalf of the agency; and<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • == Requirement 4: Encrypt transmission of cardholder data and sensitive information across public networks. == ...lder data, encrypt the transmissions by using Wi-Fi Protected Access (WPA) technology if WPA capable, or VPN or SSL at 128-bit. Never rely exclusively on WEP to ...
    2 KB (346 words) - 12:22, 31 January 2014
  • Links to helpful or interesting information security documents.<br> ...ed of lawyers, government policy and management professionals, information technology and security professionals, notaries from various legal systems, trade faci ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...pes of services offered and the complexity of the processes and supporting technology.<br> ...l of security controls based on their assessment of the sensitivity of the information to the customer and to the institution and on the institution’s established ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for the de ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results a ...his systems development life cycle (SDLC) describes the stages involved in information system development projects, from an initial feasibility study through main ...
    6 KB (863 words) - 13:12, 23 June 2006
  • The board of directors and senior management are responsible for ensuring that the institution’s system of internal cont ...hould assign responsibility for the internal audit function to a member of management (hereafter referred to as the “internal audit manager”) who has sufficient ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • Set up formal change management procedures to handle in a standardized manner all requests (including maint ...ay provide invalid information, which could result in unreliable financial information and reports.<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...ed into development and production processes and procedures to ensure that information assets are consistently available to conduct business and support business ...tem and network failures should be reported immediately to the Information Technology Director or designated IT operations manager. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • ==Security Management== ...urity Management is based on the code of practice for information security management also known as ISO/IEC 17799. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • #[[Getting it Right in Records Management | Getting it Right in Records Management]] ...rds management survey - call for sustainable ... | 2009 electronic records management survey - call for sustainable ...]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...most comprehensive, most beneficial, most accessible, and freely available information security guidance framework on the planet.<br> ...zation no matter what the size, shape, or form they come in. By protecting information, you protect identities, profits, reputations, and the list goes on and on. ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...ities, such as control and [[risk assessment]]s, on a more frequent basis. Technology plays a key role in continuous audit activities by helping to automate the ...mation can be evaluated at any given point of time, it also means that the information is able to be verified constantly for errors, fraud, and inefficiencies. It ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • '''Risk assessment''' is a step in the [[risk management]] process. Risk assessment is [[measurement|measuring]] two quantities of Risk assessment may be the most important step in the risk management process, and may also be the most difficult and prone to error. Once risks ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...tives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for follow ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ==Information Security Audit== ...dit. However, information security encompasses much more than IT. Auditing information security covers topics from auditing the physical security of data centers ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...structure (major machinery or computing/network resource). As such, [[risk management]] must be incorporated as part of BCP. ...for implementing, operating and improving a documented business continuity management system (BCMS). ...
    15 KB (2,046 words) - 11:39, 27 October 2012
View ( | ) (20 | 50 | 100 | 250 | 500)