IT Governance, Risk, and Compliance

Jun 15 2012   9:31PM GMT

Computer Hardware Risks – Part I



Posted by: Robert Davis
Tags:
Configuration Management
Digital Storage Devices
Hardware Controls
Infrastructure Management
IT Hardware
Risk Management

Some data processing specialist believe that it is unnecessary to devote much attention to hardware deployments. According to this school of thought, modern computer hardware is designed to be very resilient, and most of them have built in protection mechanisms. Consequently, control professionals should encounter effective hardware configurations. In actual practice, however, several factors can reduce IT hardware effectiveness and efficiency.

Common types of IT hardware risk

IT errors may occur due to failures in IT hardware configuration items. Specifically, errors may occur because of a failure in an electronic element or in a mechanical part of computer equipment. The risk to management from weaknesses in hardware controls is considerable because of their pervasive influence on information integrity.

Post Note: “Computer Hardware Risks – Part I” was originally posted on my Suite101.com web page under the title “Computer Hardware Risks”

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: