Search results

Jump to navigation Jump to search
  • ==National security systems== ...head of each agency operating or exercising control of a national security system shall be responsible for ensuring that the agency—<br> ...
    709 bytes (103 words) - 10:41, 2 June 2010
  • ==National security systems== ...head of each agency operating or exercising control of a national security system shall be responsible for ensuring that the agency—<br> ...
    709 bytes (103 words) - 21:02, 3 June 2010
  • ==Federal information security incident center== ...— The Director shall ensure the operation of a central Federal information security incident center to—<br> ...
    1 KB (196 words) - 19:07, 3 June 2010
  • == Requirement 11: Regularly test security systems and processes. == ...tems, processes, and custom software should be tested frequently to ensure security is maintained over time and through changes. ...
    3 KB (372 words) - 17:59, 7 July 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.4.2.4.5:|'''SOX.4.2.4.5''']] The OS/400 operating application has a session "Time-Out" function enabled.<br> ...
    6 KB (821 words) - 18:11, 28 August 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.4.2.2.5:|'''SOX.4.2.2.5''']] The WINDOWS operating application has a session "Time-Out" function enabled.<br> ...
    6 KB (779 words) - 13:45, 23 June 2006
  • :a. [[SOX.2.1.1.1:|'''SOX.2.1.1.1''']] The ROUTER operating application has a session "Time-Out" function enabled.<br> :a. [[SOX.2.1.1.3:|'''SOX.2.1.1.3''']] The ROUTER system will not allow identical administrator IDs.<br> ...
    6 KB (729 words) - 13:40, 23 June 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.2.1.3.5:|'''SOX.2.1.3.5''']] The VPN operating application has a session "Time-Out" function enabled.<br> ...
    6 KB (766 words) - 13:42, 23 June 2006
  • ::'''Examine the organization’s system configuration standards for network components and critical servers, includ ...e that they have knowledge of common security parameter settings for their operating systems, database servers, Web servers, and wireless systems.<br> ...
    3 KB (366 words) - 13:52, 28 February 2007
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.2.1.2.5:|'''SOX.2.1.2.5''']] The FIREWALL operating application has a session "Time-Out" function enabled.<br> ...
    6 KB (816 words) - 13:41, 23 June 2006
  • '''DS 5.1 Management of IT Security'''<br> ...rity at the highest appropriate organizational level, so the management of security actions is in line with business requirements. ...
    3 KB (394 words) - 17:12, 22 March 2007
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.4.2.1.5:|'''SOX.4.2.1.5''']] The UNIX operating application has a session "Time-Out" function enabled.<br> ...
    7 KB (895 words) - 13:44, 23 June 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.2.1.5.5:|'''SOX.2.1.5.5''']] The IDS-IPS operating application has a session "Time-Out" function enabled.<br> ...
    7 KB (901 words) - 13:44, 23 June 2006
  • :a. SOX.4.2.1.9: The UNIX operating system application has forensic auditing enabled to enable the monitoring of admin ...otification message produced by the system being tested to verify that the security administrators are being proactively notified of possible access violations ...
    3 KB (422 words) - 00:09, 13 June 2006
  • '''2. Risk: Unauthorized execution of privileged system commands may disrupt business processes, and corrupt critical business data :a. [[SOX.2.1.4.5:|'''SOX.2.1.4.5''']] The SWITCH operating application has a session "Time-Out" function enabled.<br> ...
    7 KB (901 words) - 13:43, 23 June 2006
  • Implement internal control, security and audit ability measures during configuration, integration and maintenanc ...tection or Prevention System|'''3.2.1.5: Intrusion Detection or Prevention System''']]<br> ...
    1 KB (146 words) - 17:19, 7 June 2006
  • Controls provide reasonable assurance that IT components, as they relate to security, processing and availability, are well protected, would prevent any unautho ...ensing details. A baseline of configuration items should be kept for every system and service as a checkpoint to which to return after changes. ...
    4 KB (506 words) - 18:44, 25 June 2006
  • ...lidate security. Remember, it only takes one hole to compromise the entire security model. The areas covered are just a portion of the constant and never-endin ...ch one to use should be carefully determined by the environment, operating system, and purpose of the DB2 server.<br> ...
    4 KB (644 words) - 14:43, 15 May 2007
  • '''DS 11.6 Security Requirements for Data Management '''<br> Establish arrangements to identify and apply security requirements applicable to the receipt, processing, physical storage and ou ...
    5 KB (649 words) - 18:23, 5 May 2006
  • A '''privilege''' in a computer system is a permission to perform an action. Examples of various privileges includ ...an action. For example, on systems where people are required to log into a system to use it, logging out will not require a privilege. Systems that do not i ...
    2 KB (341 words) - 18:37, 14 June 2007
  • '''DS 5.6 Security Incident Definition'''<br> ...ent process. Characteristics include a description of what is considered a security incident and its impact level. A limited number of impact levels are define ...
    4 KB (548 words) - 14:21, 4 May 2006
  • ...implement, and maintain a best practice, risk management-based information security program.<br> ...implement, and maintain a best practice, risk management-based Information Security Program.<br> ...
    5 KB (705 words) - 11:39, 30 May 2015
  • ...cilities, technology, and user procedures) and ensure that the information security requirements are met by all components. The test data should be saved for a ISO 17799 12.1 Security requirements of information systems.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • ...plied to both new and legacy information systems within the context of the system development life cycle and the organizational enterprise information techno :Categorize the information system and the information resident within that system based on impact. ...
    4 KB (528 words) - 16:58, 28 March 2010
  • '''DS 5.5 Security Testing, Surveillance and Monitoring'''<br> ...ly. IT security should be reaccredited periodically to ensure the approved security level is maintained. A logging and monitoring function enables the early de ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ::'''1. Risk: Insufficient configuration controls can lead to security and availability exposures that may permit unauthorized access to systems a ...']] System infrastructure, including firewalls, routers, switches, network operating systems, servers and other related devices, is properly configured to preve ...
    2 KB (315 words) - 18:38, 25 June 2006
  • ...ging scheme such that audit logs are securely written to a centralized log system. ## The centralized log system shall provide a mechanism for archiving audit logs in accordance with appli ...
    3 KB (444 words) - 20:12, 15 January 2014
  • ...h management and upgrade strategies, risks, vulnerabilities assessment and security requirements.<br> ...anges in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testing so that deployed systems ope ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...op and maintain a risk response to ensure that cost-effective controls and security measures mitigate exposure to risks on a continuing basis. The risk respons All accounts that remain following the comparison to current system accounts should be investigated as they are most likely policy violations a ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...h agency shall have performed an independent evaluation of the information security program and practices of that agency to determine the effectiveness of such ::'''(A)''' testing of the effectiveness of information security policies, procedures, and practices of a representative subset of the agenc ...
    4 KB (682 words) - 19:17, 3 June 2010
  • =='''Logical Security'''== ...n a computer network or a computer workstation. It is a subset of computer security.<br> ...
    7 KB (1,093 words) - 19:00, 5 March 2007
  • ...ort issues and upgrades, periodic review against business needs, risks and security requirements.<br> ...anges in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testing so that deployed systems ope ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...service requirements, service definitions, service level agreements (SLA), operating level agreements (OLA) and funding sources. These attributes are organized ::'''1. Risk: Development and maintenance of system with potential impact to financial reporting bypass processes for identifyi ...
    4 KB (524 words) - 15:03, 25 June 2006
  • ...h agency shall have performed an independent evaluation of the information security program and practices of that agency to determine the effectiveness of such ::'''(A)''' testing of the effectiveness of information security policies, procedures, and practices of a representative subset of the agenc ...
    4 KB (634 words) - 13:00, 4 June 2010
  • ...t Protection Standard, Company protection standards shall include specific security requirements in the following areas: ## Sample Protection Standards must be reviewed by the Information Security Department to ensure vulnerabilities are not introduced into the Company pr ...
    5 KB (681 words) - 21:56, 15 January 2014
  • ...modern computers and receive hundreds of megabytes of data, poses another security headache. A spy (perhaps posing as a cleaning person) could easily conceal ...ains fully present until overwritten at some later time when the operating system reuses the disk space. With even low-end computers being sold with 30 Gigab ...
    4 KB (702 words) - 15:52, 14 June 2007
  • ...is scheme includes details about data ownership, definition of appropriate security levels and protection controls, and a brief description of data retention a ISO 17799 4.1 Information security infrastructure.<br> ...
    3 KB (363 words) - 16:53, 9 April 2007
  • ...user activity and security related events which are reviewed daily by the security administrators.<br> ...revalidations of user group membership and user accounts are performed by security administration.<br> ...
    4 KB (550 words) - 14:34, 1 May 2006
  • [[DS1.4:| 1.4 Operating Level Agreements]]<br> [[DS5:| '''5 Ensure Systems Security''']]<br> ...
    4 KB (538 words) - 19:08, 14 June 2007
  • ==Security requirements of information systems== The objective of this category is to ensure that security is an integral part of the organization's information systems, and of the b ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...ts (NDA), escrow contracts, continued supplier viability, conformance with security requirements, alternative suppliers, penalties and rewards, etc.<br> ...OX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contrac ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...nvironment for IT, aligned with the enterprise’s management philosophy and operating style. These elements include expectations/requirements regarding delivery ...performed and appropriately approved (including account management and IT security). Obtain and examine documents associated with requirements analysis from t ...
    4 KB (580 words) - 18:00, 23 June 2006
  • '''DS 5.2 IT Security Plan '''<br> ...ith appropriate investments in services, personnel, software and hardware. Security policies and procedures are communicated to stakeholders and users. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ...lication, potentially affecting all Internet users with whatever operating system or application the code needs to function. ...ding patch application and security-minded configurations of the operating system (OS), browsers, and other network-aware software. ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ...release of only that part of the software which has been changed. For ex: Security patches to plug bugs in a software *Packaged Release : is a combination of many changes . For ex : an Operating System image containing the applications as well. ...
    2 KB (352 words) - 16:42, 20 March 2007
  • ...he 501(b) guidelines to ensure service providers have implemented adequate security controls to safeguard customer information. :* Require service providers by contract to implement appropriate security controls to comply with the guidelines ...
    6 KB (829 words) - 19:14, 17 April 2007
  • Controls provide reasonable assurance that system changes of financial reporting significance are authorized and appropriatel ...intenance and patches) for changes to applications, procedures, processes, system and service parameters, and the underlying platforms.<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • Oracle's security by default is not extremely good. For example, Oracle will allow users to c Guest default accounts, which allow anonymous users to sign on the system, MUST be disabled, changed, or otherwise properly configured to prevent acc ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...tackers are unlikely to find them. The technique stands in contrast with [[security by design]], although many real-world projects include elements of both str ...aphy was disturbing to the US government, which seems to have been using a security through obscurity analysis to support its opposition to such work. ...
    11 KB (1,798 words) - 14:44, 14 June 2007
  • * Systems documentation for computer system allegedly compromised ...ilures, slowdowns, etc. of the Record Update Section, the Criminal History System [[CHS]] as a whole, or any part thereof, or any investigations or analyses ...
    5 KB (816 words) - 15:41, 22 February 2009
  • ...force the security controls we need to comply with the companies corporate security policy.<br> * Authorization and user security administration ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • '''Federal Information Security Management Act (FISMA)''' ...support the implementation of and compliance with the Federal Information Security Management Act including: ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ==Information Security Audit== ...rom auditing the physical security of data centers to the auditing logical security of databases and highlights key components to look for and different method ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...ion. It can be used throughout a technological environment, including the operating systems, middleware, applications, file systems, and communications protoco ...e to be reconfigured to allow for adequate detection of malicious code and system intrusions.<br> ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • ===Documented operating procedures=== Operating procedures should be documented, maintained and made available to all users ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...fies a set of requirements for implementing, operating and improving a BCM System (BCMS). Part 2 describes a how the business continuity arrangements descri ...for implementing and operating a documented business continuity management system (BCMS) ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...ses. The IT process framework should be integrated in a quality management system and the internal control framework.<br> ...testing and validation must be performed to determine if those systems are operating as designed. Without adequate testing, systems may not function as intended ...
    5 KB (699 words) - 19:59, 25 June 2006
  • ...elecommunications equipment within an operations center will have a higher security zone than I/O operations, with the media used by that equipment stored at y ...en>'''HORSE FACTS:'''</font> Financial institutions should define physical security zones and implement appropriate preventative and detective controls in each ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • '''Can you mitigate database security risks?'''<br> *[[Encryption | encryption]] impacts system performance. ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...erates effectively. One important element of an effective internal control system is an internal audit function that includes adequate IT coverage.<br> * Ineffective training programs for employees and system users ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...professionals who have experience in accounting, auditing, and information security. A SSAE 16 engagement allows a service organization to have its control pol | '''2.''' Service organization's description of its system (including controls). ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...ution’s audit function. Tier II questions correspond to the Uniform Rating System for Information Technology (URSIT) rating areas and can be used to determin ::* Regulatory, audit, and security reports from key service providers ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...ation systems are defined as the computer hardware and software, including system programs and application programs, which are used to perform automated proc ...est the information systems controls to determine whether the controls are operating effectively, thereby allowing the examiners to rely on the results of the c ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ...urtherance of the administration of justice, national defense, or national security;<br> ...ny data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automate ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • ...ry for the organization, while maintaining competitive advantage and value system integrity”. It is also called ''business continuity and resiliency planning ...nting, operating and improving a documented business continuity management system (BCMS). ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • As a career security practitioner and Chief Security Officer to several companies over the years, my significant responsibility ...focused on helping you understanding the core elements of a successful IT security risk management program for a commercial enterprise, the processes of calcu ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...a law enforcement problem, but poses a serious national and international security threat as well. ...inst hostile foreign countries to further U.S. foreign policy and national security objectives. OFAC is also responsible for issuing regulations that restrict ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • Transaction or Operations risks arises from fraud, processing errors, system disruptions, or other unanticipated events resulting in the institution’s i ...rtise, and testing. Institutions should determine the appropriate level of security controls based on their assessment of the sensitivity of the information to ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...viduals and network access issues. A subsequent section addresses physical security controls. ...he financial institution’s security policy should address access rights to system resources and how those rights are to be administered.<br> ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • Users' Security Handbook The Users' Security Handbook is the companion to the Site Security ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • * Where justified for purposes of national security, public order, public health, or for the protection of third party rights, ...a parent company or any company of the same group as the data controller, operating under the same internal processes and policies ...
    18 KB (2,869 words) - 17:46, 29 August 2014
  • ...gly accessing a computer without authorization in order to obtain national security data #*Damage affecting a government computer system ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...to IT security risk management and may be found here: Risky Business: [[IT Security Risk Management Demystified]] ...] risk assessments should cover all IT risk management functions including security, outsourcing, and business continuity. Senior management should ensure IT-r ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • '''Account Balancing Monitoring System (ABMS)''' ...a monitoring tool. This information includes opening balances, funds and security transfers, accounting activity, and DI cap and collateral limits. ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • Organizations or a management system may not be certified as "ITIL-compliant" however an organization that has i ...roject to develop ITIL. IBM claims that its "Yellow Books" (''A Management System for the Information Business'') were key precursors. According to IBM: ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...h an international standard could help protect the international financial system from the types of problems that might arise should a major bank or a series ...ajor banking crisis caused mostly by credit default swaps, mortgage-backed security markets and similar derivatives. As [[Basel III]] was negotiated, this was ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...nformation, important documents, and even documents necessary for homeland security. If the hacker were to gain this information, it would mean identity theft ...lly fabricated. The most common technique involves combining a real social security number with a name and birth date other than the ones associated with the n ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...urtherance of the administration of justice, national defense, or national security; or ...ny data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automate ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...rate thread of discussions focuses on the impact of a corporate governance system in economic efficiency, with a strong emphasis on shareholders' welfare. Th ...ss author Gabrielle O'Donovan defines corporate governance as 'an internal system encompassing policies, processes and people, which serves the needs of shar ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...scal year|quarters (15 months), primarily by improperly accounting for its operating costs. Sen. Sarbanes introduced Senate Bill 2673 to the full Senate that sa * Assess both the design and operating effectiveness of selected internal controls related to significant accounts ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...consent to a law enforcement search? Such a statement helps establish the system administrator's common authority to consent to a search under to United Sta ...m; and any communications or data transiting or stored on this information system may be disclosed or used for any lawful government purpose. ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...hind configuration files that might reveal online nicknames and passwords. Operating systems and applications record additional information on the hard drive, s ...8). Agents cannot simply request permission to seize "all records" from an operating business unless agents have probable cause to believe that the criminal act ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...s, agents may want to monitor a hacker as he breaks into a victim computer system or set up a "cloned" email account to monitor a suspect sending or receivin ...s characteristic of organized crime; (3) an immediate threat to a national security interest; or (4) an ongoing attack on a protected computer (as defined in 1 ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...ulder, when he did not own the computer he used, and when he knew that the system administrator could monitor his activities). Nor will individuals generally v. System Administrators ...
    154 KB (23,956 words) - 13:16, 5 August 2011