Читайте также: |
|
AML | Anti Money Laundering |
API | Application Programming Interface |
ASP | Active Server Pages |
BPEL | Business Process Execution Language |
BPM | Business Process Management |
CDD | Customer Due Diligence |
CFT | Combating Financing of Terrorism |
COBIT | Control Objectives for Information And Related Technology |
COTS | Commercial Off The Shelf |
CTR | Cash Transaction Report |
DBMS | Database Management System |
DDoS | Distributed Denial of Service |
DoS | Denial of Service |
EMS | Enterprise Management Solution |
ESW | Egmont Secure Web |
FAQs | Frequently Asked Questions |
FATF | Financial Action Task Force |
FD | FISMM Domain |
FIU | Financial Intelligence Unit |
HIDS | Host-Based Intrusion Detection System |
HTML | Hyper Text Markup Language |
HTTPS | Hypertext Transfer Protocol Secure |
IDPS | Intrusion Detection and Prevention System |
IDS | Intrusion Detection Systems |
IEC | International Electrotechnical Commission |
IM | Information Management |
IPR | Intellectual Property Rights |
IPS | Intrusion Prevention System |
ISO | International Organization for Standardization |
ISP | Internet Service Provider |
JSP | Java Server Page |
KGI | Key Goal Indicator |
KPI | Key Performance Indicator |
KYC | Know Your Customer |
LEA | Law Enforcement Agency |
LMS | Learning Management System |
MIS | Management Information System |
ML | Money Laundering |
NAT | Network Access Translation |
NDA | Non-Disclosure Agreement |
NIDS | Network Intrusion Detection System |
ODBC | Open Database Connectivity |
OLAP | Online Analytical Processing |
Portable Document Format | |
RDBMS | Relational Database Management System |
SAR | Suspicious Activity Report |
SLA | Service Level Agreement |
SOA | Service Oriented Architecture |
SQL | Structured Query Language |
SSL | Secure Socket Layer |
STR | Suspicious Transaction Report |
TF | Terrorist Financing |
UNSCR | United Nations Security Council Resolution |
URL | Uniform Resource Locator |
VPN | Virtual Private Networking |
XML | Extensible Markup Language |
XSD | XML Schema Definition |
Bibliography
1. Best practices for the Exchange of Information between Financial Intelligence Units (Egmont Group)
2. Control Objectives for Information and related Technology (COBIT 4.1) of the IT Governance Institute
3. Egmont Biennial Census Survey form
4. Principles for Information Exchange (Egmont Group)
5. ISO/IEC 27000 family of standards
6. Methodology for Assessing Compliance with the FATF 40 Recommendations and FATF 9 Special Recommendations
7. PD 3002:2002 - Guide to BS 7799 Risk Assessment
8. Statement of purpose of the Egmont Group of Financial Intelligence Units
9. Tactical Analysis Training Course of the Training Working Group (TWG)
10. The 40+9 Recommendations of FATF
11. Working paper on ‘Operational issues: Ongoing work’ prepared by Working Group on Typologies (2011)
[1] base practices are activities which must be successfully implemented to accomplish the purpose of the domain they support.
[2] One technology may be related to more than one domain. One product may provide functionalities of more than one technology
[3] Source: Tactical Analytical Course of TWG
Дата добавления: 2015-11-14; просмотров: 45 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
Base Practices | | | Five Ways to Speak More Naturally |