Примеры использования Information technology security на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Information technology security.
Currently, the head of the department of information technology security.
Information technology security specialist.
Preliminary steps were also being taken by the Government regarding the draft legislation on information technology security.
Information technology security and access.
Instances where the requirements of the Fund's information technology security policy had not been fully implemented;
Information technology security and disaster recovery.
The Office of Internal Oversight Services found that the information technology security policy need to be improved.
Information Technology Security PeopleSoft Applications.
These relate to retrenchment benefits, fleet management, information technology security and long-standing financial recoveries.
Information Technology Security(PeopleSoft Applications) 17-Oct-08.
Common Criteria is the first international standardized process for information technology security evaluation, validation and certification for NIAP.
Information Technology Security(PeopleSoft Applications) 17-Oct-08.
The strategic processes for risk control and governance, andthe internal control framework, including information technology security and control;
ITSEC ITSEC Information Technology Security Evaluation Criteria 1991.
The project was founded by Robert Watson with the goal of implementing concepts from the Common Criteria for Information Technology Security Evaluation and the Orange Book.
UNHCR information technology security relating to PeopleSoft applications AR2008/166/01.
This Article has been implemented through requirement 274 of Appendix 1B andits sub-appendix 10 which refer to the Information Technology Security Evaluation Criteria ITSEC.
Information technology security is a relevant task of numerous organizations with automated business processes.
Caterpillar utilizes reasonable measures,including information technology security and physical security measures, to protect personal information. .
The Information Technology Security Officer will document and ensure compliance with procedures, including but not limited to the following.
Based on the analysis of risks and the recurring types of audit recommendations, three main areas require attention: business processes,national execution, and information technology security.
The Common Criteria for Information Technology Security Evaluation(referred to as Common Criteria or CC) is an international standard(ISO/IEC 15408) for computer security certification.
Specific issues raised included the financial and performance monitoring of implementing partners and project monitoring, procurement,asset management, and information technology security, including the safeguarding of data.
In this function, BSI publishes binding minimum information technology security standards for the federal administration and serves as its central information technology incident reporting office.
The provisions on security shall conform with the provisions laid out in Council Recommendation No. 95/144/ECof 7 April 1995, on common information technology security evaluation criteria(ITSEC) OJEC, No. L 93, 26/04/1995.
Improve its information technology security by finalizing its corporate information security policy and, in consultation with other United Nations organizations, complete its disaster recovery plan as soon as possible(para. 178);
The recommendation for the previous biennium on the implementation of ISO 17799(Information technology security techniques-- code of practice for information security management) was not implemented.
These relate to compliance with UN Minimum Operating Security Standards; management of implementing partners;financial management of field operations; and information technology security.
OIA findings on information technology security in country offices addressed the organization's current ERP system-- the Programme Management System application(ProMS), which will soon be replaced by VISION.