IT Governance, Risk, and Compliance:

Configuration Management


December 8, 2012  1:34 AM

Network Infrastructure Security: Intrusion Detection Systems – Part VI



Posted by: Robert Davis
Access Controls, Availability Management, Configuration Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Information Assets Protection, IT Security Infrastructure, Logical Security, Management Information Systems, Risk Management

Network-based intrusion detection captures traffic and performs analyses to identify notable events. If placed at the front-end IT perimeter, the properly configured network-based IDS will detect all externally initiated attack attempts, even where the firewall subsequently permits...

November 17, 2012  1:58 AM

A Few Fundamental Features of IPv6 Internetworking – Part VI



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Public Key Infrastructure, Service Delivery, Transport Mode, Tunnel Mode

Why understanding IPv6 is important to end-users Currently, the dominant internetworking protocol is Internet Protocol version 4 (IPv4). Yet, each IPv4 address is limited to a thirty-two bit field length, which corresponds...


November 15, 2012  2:54 AM

A Few Fundamental Features of IPv6 Internetworking – Part V



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Public Key Infrastructure, Service Delivery, Transport Mode, Tunnel Mode

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 10, 2012  2:40 AM

A Few Fundamental Features of IPv6 Internetworking – Part IV



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Service Delivery

Upon arrival at the destination, the original internetworking message is reassembled in the correct order, based on the imprinted packet sequence number. Thus a virtual connection is established with the end-station through a

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 8, 2012  1:20 AM

A Few Fundamental Features of IPv6 Internetworking – Part III



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet, Internet Governance, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Service Delivery

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 2, 2012  11:13 PM

A Few Fundamental Features of IPv6 Internetworking – Part II



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet, Internet Governance, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Service Delivery

Packet-switched networking model As presented in the article A Few Fundamentals of Networking Electronically Encoded Data, data must be organized for transmission. Thus, the creation of usable telecommunication packets requires appending a unique header to the message destined...


October 27, 2012  2:18 AM

Essential Operating System Protection Mechanisms – Part VI



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

Sustaining information integrity requires operating system protection Usually, IT network environments orchestrate direction and control through an operating system installed to coordinate processes; including application software. In other words, an operating system performs...


October 25, 2012  3:31 AM

Essential Operating System Protection Mechanisms – Part V



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

Bookmark and Share     0 Comments     RSS Feed     Email a friend


October 20, 2012  12:44 AM

Essential Operating System Protection Mechanisms – Part IV



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

Preventing infinite program loops Processor protection deters infinite program loops that could affect availability. Inserting a timer prevents programs from being stuck in infinite loops, and never returning control to the operating system. The operating system timer...


October 18, 2012  1:18 AM

Essential Operating System Protection Mechanisms – Part III



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

  [caption id="attachment_1585" align="alignleft" width="300"]

Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: