Term
|
Definition
the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems |
|
|
Term
|
Definition
methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy amd reliability of its records, and operational adherence to managment standards |
|
|
Term
|
Definition
outlines medical security and privacy rules and procedures for simplifying the administration of healthcare billing and automating the transfer of healthcare data between healthcare providers, payers and plans |
|
|
Term
|
Definition
requires financial institutions to ensure the security and confidentiality of customer data |
|
|
Term
|
Definition
Law passed in 2002 that imposes responsibility on companies and their management to protect investors by safeguarding the accuracy and integrity of financial information that is used internally and released externally |
|
|
Term
|
Definition
the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law |
|
|
Term
|
Definition
specific controls unique to each computerized application such as payroll or order processing. Can be classified as input controls, processing controls, and output controls |
|
|
Term
|
Definition
determines the level of risk to the firm if a specific activity or process is not properly controlled |
|
|
Term
|
Definition
consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals |
|
|