CISA Quick Tips 08-2111
1. Data mining is the process of analyzing data from different sources and perspectives and summarizing it into helpful information by means of association, clustering, sequencing and forecasting.
2. RSA algorithm uses message authentication code (MAC) for authenticating the message.
3. IS Policy and Business objective should be mutually supportive
4. IT Security policy should be regularly reviewed and be tuned with the technological changes.
5. Ideal way to monitor relationship between source code and object code is the time stamp comparison.Unauthorized changes can also be detected by time stamp comparison.
0 comments:
Post a Comment