IT Governance, Risk, and Compliance

Oct 27 2012   2:18AM GMT

Essential Operating System Protection Mechanisms – Part VI

Posted by: Robert Davis
Central Processing Unit
Configuration Management
Control Techniques
Information Communication Technology
Information Security
Information Security Infrastructure Management
Infrastructure Management
IT Configuration
IT Controls
IT Infrastructure
IT Security Infrastructure
Logical Security
Operational Level Agreement
Risk Management
Risk Mitigation

Sustaining information integrity requires operating system protection

Usually, IT network environments orchestrate direction and control through an operating system installed to coordinate processes; including application software. In other words, an operating system performs most generally accepted management functions for IT processes.

Without an operating system certain functions, such as multiprogramming, simply would not be an available processing option, and many functions like I/O completion testing would have to be performed directly by a programmer. Therefore, operating systems are the primary catalyst sustaining efficient and effective information integrity. If this viewpoint is adopted throughout the entity, IT owners should ensure adequate protection mechanisms are installed with employed operating systems.


Davis, Robert E. IT Auditing: Assuring Information Assets Protection. Mission Viejo, CA: Pleier Corporation, 2008. CD-ROM. Unabridged (v 1.1). rev. ed. New York, NY: Random House. editor (accessed: August 30, 2008).

Lyon, Lockwood and Kenniston W. Lord. CDP Review Manual: Covering the ICCP, CDP, CSP, and CCP Examinations, 5th ed. New York, NY: Van Nostrand Reinhold, 1991. 130-2

Minasi, Mark. Complete PC Upgrade and Maintenance Guide, 8th ed. San Francisco, CA: SYBEX, 1997. 263-4

Watne, Donald A. and Peter B. B. Turney. Auditing EDP Systems. Englewood Cliffs, NJ: Prentice-Hall, 1984. 239

Silbershatz, Abraham and Peter B. Galvin. Operating System Concepts, 4th ed. Gainesville, FL: Addison-Wesley, 1995. 49-50

View Part I of the Essential Operating System Protection Mechanisms series here


Post Note: “Essential Operating System Protection Mechanisms – Part VI” was originally published through under the title “Essential Operating System Protection Mechanisms”

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: