IT Governance, Risk, and Compliance:

Availability


October 19, 2009  7:12 PM

Service Restoration Planning – Part IV



Posted by: Robert Davis
Availability, Backup Plan, BCP, Business Continuity Plan, Crisis, Disaster, Disaster Recovery Plan, Disruption, DRP, Emergency, Service Restoration Plan, SRP

Considering information systems are generally critical to enhancing productivity, it is imperative deployed IT provide availability with service responsiveness meeting user utilization demands, even during crisis situations. Entity susceptibility as well as IT operational resiliency impact...

October 15, 2009  6:32 PM

Service Restoration Planning – Part III



Posted by: Robert Davis
Availability, Backup Plan, BCP, Business Continuity Plan, Crisis, Disaster, Disaster Recovery Plan, Disruption, DRP, Emergency, Service Restoration Plan, SRP

Cost effective strategies should be designed to prevent, detect and/or mitigate the impact of potential crises. Reducing system vulnerabilities is typically accomplished by delineating then remediating single as well as combined configuration...


October 5, 2009  7:45 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part V



Posted by: Robert Davis
Air Flow, Availability, Boards, Cards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

Decreasing computer hardware replacement cost has not eliminated the need for adequate environmental protection. To avoid humidity corruption, information security managers should verify humidity and temperature levels are maintained within the...


October 1, 2009  11:22 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part IV



Posted by: Robert Davis
Air Flow, Availability, Boards, Cards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

IT can, and does, operate within a wide humidity range. Seasonal humidity changes are usually easier to control than hourly fluctuations. Under either circumstance, normally the primary environmental concern is preventing conditions that permit humidity alterations where condensation is the...


September 28, 2009  6:11 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part III



Posted by: Robert Davis
Air Flow, Availability, Boards, Cards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

When the relative humidity is high, water particulates are formed corresponding to the heat index. High humidity can warp hardware configuration cards. In addition, without adequate insulation, any conditions that cause...


September 24, 2009  7:03 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part II



Posted by: Robert Davis
Air Flow, Availability, Boards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

Climatically, strategizing optimum environmental conditions for information assets is a managerial safeguarding responsibility....


September 21, 2009  6:24 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part I



Posted by: Robert Davis
Availability, Boards, Care, Delivery, Due Diligence, Install-and-Forget, Monitoring, Plug-and-Play

'Plug-and-Play' devices should never be regarded as 'Install-and-Forget' hardware. Though computer operations personnel are normally responsible for IT related hardware implementations,...


March 16, 2009  7:01 PM

Physical Token Protection – Part IV



Posted by: Robert Davis
Availability, CIA, Confidentiality, Functionality, Identification, Information Security Management, Integrity, ISM, IT Security, Laws and Regulations, Quality, Service Level Agreement, SLA, Token, Usability

Regarding provisioning physical authentication mediums, an entity's deployed access control process should clearly define the way encoded identification is delivered to users -- within the context of promoting adequate confidentiality, integrity and availability. Specifically, the process to...


March 12, 2009  6:41 PM

Physical Token Protection – Part III



Posted by: Robert Davis
Availability, CIA, Confidentiality, Functionality, Identification, Information Security Management, Integrity, ISM, IT Security, Laws and Regulations, Quality, Service Level Agreement, SLA, Token, Usability

As a corollary requirement, when considering physical tokens, functionality is directly related to capabilities. Consequently, physical token appropriateness should be evaluated based on the set of attributes applicable to the existing set of activities and their specific properties. In other...


March 9, 2009  6:56 PM

Physical Token Protection – Part II



Posted by: Robert Davis
Availability, CIA, Confidentiality, Functionality, Identification, Information Security Management, Integrity, ISM, IT Security, Laws and Regulations, Service Level Agreement, SLA, Token, Usability

Information asset usability implies availability to perform requested services as well as transparency. Determining physical token usability necessitates assessing relevant and pertinent services for the access process as well as secure user delivery in a timely, correct, and consistent manner....


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: