IT Governance, Risk, and Compliance:

July, 2009

1

July 30, 2009  6:25 PM

Critical Incident Response Elements – Part III



Posted by: Robert Davis
Contingency Management, Incident Response, Information, Management Information System, MIS, Organization, Risk Management, Security Service, Threat Management

There exist various theories concerning managing employees during a crisis scenario. Nevertheless, security incident response tactics should be viewed as a unique application of contingency...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

July 27, 2009  8:31 PM

Critical Incident Response Elements – Part II



Posted by: Robert Davis
Incident Response, Information, Management Information System, MIS, Organization, Security Service, Threat Management

By definition, an entity's management information system (MIS) represents an aggregation of personnel, computer hardware and software, as well as procedures that process data in order to generate utilizable...


July 23, 2009  4:53 PM

Critical Incident Response Elements – Part I



Posted by: Robert Davis
Incident Response, Information, Management Information System, MIS, Organization, Security Service, Threat Management

Information technology is completely secure when resources are utilized and accessed as intended under all circumstances. Through delegation, every entity manager assumes responsibility for maintaining an adequate control system that safeguards assets. However,


July 20, 2009  7:28 PM

Biometric Technology – Part IV



Posted by: Robert Davis
Access Controls, Authentication, Biometrics, Crackers, Hackers, IAP, Identification, Information Assets Protection, Information Security, Information Security Infrastructure Management, ISIM

Technology attacks and attendant security compromises are never easily managed. Parallel to the ingenuity of attackers and proportional to the value placed on entrusted information assets, effective security access controls are imperative. Given the current accuracy of automated user...


July 16, 2009  8:31 PM

Biometric Technology – Part III



Posted by: Robert Davis
Access Controls, Authentication, Biometrics, Crackers, Hackers, IAP, Identification, Information Assets Protection, Information Security, Information Security Infrastructure Management, ISIM

Through the identification or authentication process, decisions are made regarding access. Typically, biometric identification supports physical access controls, while biometric authentication...


July 13, 2009  6:25 PM

Biometric Technology – Part II



Posted by: Robert Davis
Access Controls, Authentication, Biometrics, Crackers, Hackers, IAP, Identification, Information Assets Protection, Information Security, Information Security Infrastructure Management, ISIM

Most information security practitioners accept biometrics as the science employing distinctive human attributes to discern access right validity. Specifically, imparting the Information Systems Audit and...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 9, 2009  8:20 PM

Biometric Technology – Part I



Posted by: Robert Davis
Access Controls, Biometrics, Crackers, Hackers, IAP, Information Assets Protection, Information Security, Information Security Infrastructure Management, ISIM

As technological advancements are increasingly immersed in routine human endeavors, few security professionals doubt the criticality for parallel and proportional achievements in information...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 6, 2009  7:02 PM

Trans-border Communication Protection – Part IV



Posted by: Robert Davis
Configuration Items, Encapsulating Security Payload, Encapsulation, ESP, Infrastructure, Internet Protocol Security, IPSec, Open Systems Interconnection, OSI, Privacy, Secure Socket Layer, SSL, Transport Mode, Tunnel Mode, Virtual Private Network, VPN

The primary distinguishing feature between IPSec and SSL is their respective OSI reference model protocol communication tier levels. IPSec operates at the network layer of the


July 2, 2009  8:12 PM

Trans-border Communication Protection – Part III



Posted by: Robert Davis
Configuration Items, Encapsulating Security Payload, Encapsulation, ESP, Infrastructure, Internet Protocol Security, IPSec, Open Systems Interconnection, OSI, Privacy, Secure Socket Layer, SSL, Transport Mode, Tunnel Mode, Virtual Private Network, VPN

Generally, a VPN is recognized as a confidential data plexus that employs the public telecommunication infrastructure while maintaining...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: