IT Governance, Risk, and Compliance

Aug 1 2012   12:33AM GMT

IT Hardware Duplicity and Echo Checks – Part III



Posted by: Robert Davis
Tags:
Configuration Management
Control Methods
Echo Check
Hardware Controls
Information Communication Technology
Information Security
Infrastructure Management
Integrity
IT Architecture
IT Configuration
IT Hardware
IT Security
Risk Management

IT echo checking to ensure data integrity and command compliance

The control purpose of an IT hardware echo check is to ensure that commands sent to peripheral, or remote, equipment are obeyed and that datum are received correctly. In this activity, the computer checks to ensure that its directives are obeyed by requiring that contacted equipment return a signal verifying that the command has been received and complied with. For instance, the CPU transmits a command to the printer to commence processing, and the printer transmits a message back to the CPU that it has been activated as instructed.

The same echo check technique is utilized in data communications to ensure that data is received correctly. For example, data is retransmitted by the receiving computer back to the sending computer. The sending computer then compares the echo with the original data for possible transmission errors.

 

Video Link: http://youtu.be/HEjPop-aK_w

 

Sources:

Davis, Robert E. IT Auditing: Assuring Information Assets Protection. Mission Viejo, CA: Pleier Corporation, 2008. CD-ROM.

Gleim, Irvin N. CIA Examination Review. 3rd ed. Vol. 1. Gainesville, FL: Accounting Publications, 1989. 284

Watne, Donald A. and Peter B. B. Turney. Auditing EDP Systems. Englewood Cliffs, NJ: Prentice-Hall, 1984. 230-1, 490, 499

 

View Part I of the IT Hardware Duplicity and Echo Checks series here

 

Post Notes: “IT Hardware Duplicity and Echo Checks – Part III” was originally published through Suite101.com under the title “IT Hardware Duplicity and Echo Checks”.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: