IT Governance, Risk, and Compliance:

December, 2012

1

December 29, 2012  5:48 AM

eBook excerpt: Assuring Information Security – Part VI

Robert Davis Robert Davis Profile: Robert Davis

Dynamic homeostasis is steady state achievement by a relatively open system.  This condition is the result of receiving input from outside the system that is at least equal to the sum of system output and resource expenditure.  Thus, a for-profit entity must earn profits in the long run to...

December 27, 2012  1:31 AM

eBook excerpt: Assuring Information Security – Part V

Robert Davis Robert Davis Profile: Robert Davis

1.1 Control Environment

“…culture determines the behaviour of people in an organisation and should, therefore, be used to influence the behaviour of people with regard to information security.” – Kerry-Lynn Thomson and Rossouw von...


December 22, 2012  1:43 AM

eBook excerpt: Assuring Information Security – Part IV

Robert Davis Robert Davis Profile: Robert Davis

Usually, a formal ISG program is required to promote information assets safeguarding.  ISG programs should ensure the Control Objectives for Information and related Technology (COBIT) framework confidentiality, integrity, availability, compliance, and reliability information criteria are not...


December 20, 2012  2:52 AM

eBook excerpt: Assuring Information Security – Part III

Robert Davis Robert Davis Profile: Robert Davis

Acquisitions and implementations are necessary for adequate information security.  To realize the information security strategy, information security solutions need to be identified, developed or acquired, as well as implemented and integrated into business and IT processes seamlessly.  During an...


December 15, 2012  12:05 AM

eBook excerpt: Assuring Information Security – Part II

Robert Davis Robert Davis Profile: Robert Davis

Instituting and/or sustaining ISG requires comprehensive planning and organizing; robust acquisitions and implementations; effective delivery and support; as well as continuous monitoring and evaluation to address the myriad of managerial, operational, and technical issues that can thwart...


December 13, 2012  1:52 AM

eBook excerpt: Assuring Information Security – Part I

Robert Davis Robert Davis Profile: Robert Davis

Chapter 1: Information Security Governance

“The information possessed by an organization is among its most valuable assets and is critical to its success.  The Board of Directors, which is ultimately accountable for the organization’s success, is therefore...


December 8, 2012  1:34 AM

Network Infrastructure Security: Intrusion Detection Systems – Part VI

Robert Davis Robert Davis Profile: Robert Davis

Network-based intrusion detection captures traffic and performs analyses to identify notable events. If placed at the front-end IT perimeter, the properly configured network-based IDS will detect all externally initiated attack attempts, even where the firewall subsequently permits...


December 5, 2012  11:32 PM

Network Infrastructure Security: Intrusion Detection Systems – Part V

Robert Davis Robert Davis Profile: Robert Davis

Bookmark and Share     0 Comments     RSS Feed     Email a friend


December 1, 2012  12:09 AM

Network Infrastructure Security: Intrusion Detection Systems – Part IV

Robert Davis Robert Davis Profile: Robert Davis

As suggested in the aforementioned paragraph, depending on the...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: