Control Objects for Information and Related Technology (COBIT)
- can be used to as the basis for internal and external security audits.
- determines the security mechanisms to be implemented for a system.
Information Technology Security Evaluation Criteria (ITSEC) involves evaluation assurance by reviewing the development practices, documentation, configuration management and testing mechanisms of a system. Also, it provides separate ratings for functionality and assurance.
Trusted Computer System Evaluation Criteria aren’t a good evaluation tool for commercial systems, because it’ won’t address the issue of data integrity. It evaluates the security policy and assurance levels of a system.
Attach a shut-off wrench to a cord near the shut-off valve.
Notifications