IT Governance, Risk, and Compliance:

July, 2009

1

July 30, 2009  6:25 PM

Critical Incident Response Elements – Part III

Robert Davis Robert Davis Profile: Robert Davis

There exist various theories concerning managing employees during a crisis scenario. Nevertheless, security incident response tactics should be viewed as a unique application of contingency...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

July 27, 2009  8:31 PM

Critical Incident Response Elements – Part II

Robert Davis Robert Davis Profile: Robert Davis

By definition, an entity's management information system (MIS) represents an aggregation of personnel, computer hardware and software, as well as procedures that process data in order to generate utilizable...


July 23, 2009  4:53 PM

Critical Incident Response Elements – Part I

Robert Davis Robert Davis Profile: Robert Davis

Information technology is completely secure when resources are utilized and accessed as intended under all circumstances. Through delegation, every entity manager assumes responsibility for maintaining an adequate control system that safeguards assets. However,


July 20, 2009  7:28 PM

Biometric Technology – Part IV

Robert Davis Robert Davis Profile: Robert Davis

Technology attacks and attendant security compromises are never easily managed. Parallel to the ingenuity of attackers and proportional to the value placed on entrusted information assets, effective security access controls are imperative. Given the current accuracy of automated user...


July 16, 2009  8:31 PM

Biometric Technology – Part III

Robert Davis Robert Davis Profile: Robert Davis

Through the identification or authentication process, decisions are made regarding access. Typically, biometric identification supports physical access controls, while biometric authentication...


July 13, 2009  6:25 PM

Biometric Technology – Part II

Robert Davis Robert Davis Profile: Robert Davis

Most information security practitioners accept biometrics as the science employing distinctive human attributes to discern access right validity. Specifically, imparting the Information Systems Audit and...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 9, 2009  8:20 PM

Biometric Technology – Part I

Robert Davis Robert Davis Profile: Robert Davis

As technological advancements are increasingly immersed in routine human endeavors, few security professionals doubt the criticality for parallel and proportional achievements in information...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 6, 2009  7:02 PM

Trans-border Communication Protection – Part IV

Robert Davis Robert Davis Profile: Robert Davis

The primary distinguishing feature between IPSec and SSL is their respective OSI reference model protocol communication tier levels. IPSec operates at the network layer of the


July 2, 2009  8:12 PM

Trans-border Communication Protection – Part III

Robert Davis Robert Davis Profile: Robert Davis

Generally, a VPN is recognized as a confidential data plexus that employs the public telecommunication infrastructure while maintaining...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: