IT Governance, Risk, and Compliance:

Control Processes


August 22, 2012  12:49 AM

IT Hardware Validity Checks – Part IV



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, CPU, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Firmware, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Some IT configurations are capable of assigning whole sections of memory for prescribed operations, programs, and/or data. These assigned sections of memory can be protected by a hardware address validity check. This type of control is also known as

August 17, 2012  11:59 PM

IT Hardware Validity Checks – Part III



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, CPU, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Firmware, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Validity checking of datum passed to peripheral devices A data validity check compares characters or fields that are written or read with a set of all valid characters or fields. It is particularly useful technique with peripheral devices such as printers. For example, a...


August 15, 2012  12:34 AM

IT Hardware Validity Checks – Part II



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Information validity implies data elements represent real conditions, rules or relationships rather than physical object characteristics. IT hardware validity checks are preventive and/or detective control measures that should be implemented to ensure appropriate data processing. There are three...


August 11, 2012  12:36 AM

IT Hardware Validity Checks – Part I



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Hardware, IT Infrastructure, IT Security, Media Errors, Risk Management

IT hardware validity checks are preventive and/or detective control measures that should be implemented to ensure appropriate data processing. An important component of enabling information integrity is sustaining data and task validity. Within...


August 7, 2012  5:48 PM

Are Organizations Potentially Falling Short?



Posted by: Robert Davis
Accountability, Accounting, Application Portfolio Management, Asset Management, Audit Assurance, Audit Committee, Certified Information Systems Auditor, Change Control, Change Management, Control Processes, Decision Making, Enterprise Governance, ERP, Fiduciary Responsibility, Governance Tree, IT Governanace, Life Cycle Management, Organizational Structure, Project Management, Risk Management, Value Delivery

Current events posted by various news outlets, including Fox News, the Wall Street Journal, Forbes and Yahoo.com, concerning Knight Capital’s financial debacle, present some very serious allegations regarding managerial due diligence during system development...


May 3, 2011  9:33 PM

Right-sizing IT Controls – Part VIII



Posted by: Robert Davis
Control Environment, Control Evaluation, Control Processes, Control System, Governance Tree, Internal Control Systems, IT Controls, IT Governanace, IT Management, Risk Management, Roles and Responsibilities

Deploying key IT governance practices enhance an entity’s ability to meet control objectives for cost, functionality, and quality. Yet, regardless of the IT control techniques and automated tools available, the...


April 29, 2011  8:28 PM

Right-sizing IT Controls – Part VII



Posted by: Robert Davis
Control Environment, Control Evaluation, Control Processes, Control System, Governance Tree, Internal Control Systems, IT Controls, IT Governanace, IT Management, Risk Management, Roles and Responsibilities

An entity’s controlling and monitoring activities should reflect management’s strategy for ensuring an adequate IT control system. Consequently, IT policies, directives, standards, procedures, and rules should have a one-to-one or one-to-many correspondence with the assessed...


April 26, 2011  8:53 PM

Right-sizing IT Controls – Part VI



Posted by: Robert Davis
Control Environment, Control Evaluation, Control Processes, Governance Tree, Internal Control Systems, IT Controls, IT Governanace, IT Management, Risk Management, Roles and Responsibilities

The risk management process introduces a systematic approach for identifying, assessing, and reducing risks as well as maintaining defined acceptable risk levels. An IT risk assessment should be considered a key risk management practice area. When management institutionalizes an...


April 22, 2011  8:16 PM

Right-sizing IT Controls – Part V



Posted by: Robert Davis
Control Environment, Control Evaluation, Control Processes, Governance Tree, Internal Control Systems, IT Controls, IT Governanace, IT Management, Roles and Responsibilities

IT organization is implemented to prevent chaos and assist in identifying processes for objective achievement. The organizing process transforms the entity plan into controllable areas and includes:

  • Identification and...


April 19, 2011  8:27 PM

Right-sizing IT Controls – Part IV



Posted by: Robert Davis
Control Environment, Control Evaluation, Control Processes, Governance Tree, Internal Control Systems, IT Controls, IT Governanace, IT Management, Roles and Responsibilities

Processes modify system elements deployed to assist in achieving IT program goals. When pursuing identification, process maps are a standard method to document all pertinent system information. Developmentally,...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: