Information Technology Security Assessment

Results: 459



#Item
121Technology / Information Technology Infrastructure Library / Service desk / Incident management / IT service management / Systems engineering process / Information security / Evaluation / Change management / Information technology management / Public safety / Management

White Paper Assessment Method – Making IT Services Visible – Global Services Operations Division

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2012-01-14 04:50:30
122Cryptographic protocols / Internet protocols / Internet privacy / Secure communication / Internet standards / Opportunistic encryption / Science and Technology Options Assessment / Transport Layer Security / HTTP Secure / Internet / Network architecture / Computing

Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-02-12 15:10:02
123Computing / Computer network security / Security controls / National Institute of Standards and Technology / Unemployment benefits / Information Technology Security Assessment / NIST Special Publication 800-53 / Federal Information Security Management Act / Computer security / Data security / Security

Microsoft Word - UIPL SEC[removed]Chg3.doc

Add to Reading List

Source URL: wdr.doleta.gov

Language: English - Date: 2009-03-06 15:02:05
124Risk / Information technology controls / Sarbanes–Oxley Act / Internal control / Audit / Committee of Sponsoring Organizations of the Treadway Commission / Internal audit / SOX 404 top–down risk assessment / Information Systems Audit and Control Association / Auditing / Accountancy / Business

Journal Online Managing Sarbanes-Oxley Section 404 Compliance in ERP Systems Using Information Security Control Reports Abhik Chaudhuri, MCA, PMP, is an IBM-accredited

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2010-05-02 17:38:01
125Computer security / Business / Management / Information technology audit / Internal control / Information security / Committee of Sponsoring Organizations of the Treadway Commission / Corporate governance of information technology / Security controls / Data security / Auditing / Security

DEFINING INTERNAL CONTROL OBJECTIVES FOR INFORMATION SYSTEMS SECURITY: A VALUE FOCUSED ASSESSMENT Mishra, Sushma, Virginia Commonwealth University, 301 W Main Street, Box[removed], Richmond, Virginia, USA, [removed]

Add to Reading List

Source URL: is2.lse.ac.uk

Language: English - Date: 2008-05-11 18:07:12
126Computing / Software engineering / Information society / Interpreter / Harri Hursti / Voter-verified paper audit trail / Software bug / Pointer / Hursti Hack / Electronic voting / Election fraud / Politics

Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Add to Reading List

Source URL: www.votetrustusa.org

Language: English - Date: 2007-12-11 09:17:41
127Crime prevention / National security / Public safety / Privacy / Science and Technology Options Assessment / Internet privacy / Open-source software / Cloud computing / Information privacy / Security / Ethics / Human rights

Science and Technology Options Assessment (STOA) Mass Surveillance Part 2 – Technology foresight, options for longer term security

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-01-13 15:07:22
128Cyberwarfare / Computer network security / Hacking / Vulnerability / Social vulnerability / Information security / VM / Zero-day attack / TRAC / Risk / Security / Computer security

Vulnerability Management Solutions are Flawed, Leaving your Enterprise at High Risk The lack of advanced network endpoint correlation in your assessment technology introduces bedlam December 2014

Add to Reading List

Source URL: www.ddifrontline.com

Language: English - Date: 2014-12-16 16:32:21
129Risk management / Actuarial science / Information Technology Security Assessment / Risk assessment / Systems engineering process / Risk / Management / Ethics

TRA-1 Harmonized Threat and Risk Assessment Methodology Appendix A-6 - Sample TRA Work Plan 1 Background

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-30 03:32:44
130Cyberwarfare / Computer network security / Risk analysis / Security controls / Vulnerability / Information security management system / Information Technology Security Assessment / Threat / Emergency management / Computer security / Security / Data security

TRA-1 Harmonized Threat and Risk Assessment Methodology Appendix D-2 - Vulnerability Listing

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-30 04:10:15
UPDATE