IT Governance, Risk, and Compliance:

Distributed Platforms


December 8, 2012  1:34 AM

Network Infrastructure Security: Intrusion Detection Systems – Part VI



Posted by: Robert Davis
Access Controls, Availability Management, Configuration Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Information Assets Protection, IT Security Infrastructure, Logical Security, Management Information Systems, Risk Management

Network-based intrusion detection captures traffic and performs analyses to identify notable events. If placed at the front-end IT perimeter, the properly configured network-based IDS will detect all externally initiated attack attempts, even where the firewall subsequently permits...

December 5, 2012  11:32 PM

Network Infrastructure Security: Intrusion Detection Systems – Part V



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, Logical Security, Management Information Systems, Risk Management

Bookmark and Share     0 Comments     RSS Feed     Email a friend


December 1, 2012  12:09 AM

Network Infrastructure Security: Intrusion Detection Systems – Part IV



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, IT Security Services, Logical Security, Management Information Systems, Risk Management

As suggested in the aforementioned paragraph, depending on the...


November 29, 2012  1:41 AM

Network Infrastructure Security: Intrusion Detection Systems – Part III



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, IT Security Services, Logical Security, Management Information Systems, Risk Management

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 24, 2012  12:12 AM

Network Infrastructure Security: Intrusion Detection Systems – Part II



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, IT Security Services, Logical Security, Management Information Systems, Risk Management

Intrusion detection aids in reacting to network infrastructure incursions. Derivatively, the main value of intrusion detection is early incident or event awareness and subsequent, timely intervention resulting in a loss experience that is less than what might otherwise ensue from a security breach....


November 21, 2012  6:28 PM

Network Infrastructure Security: Intrusion Detection Systems – Part I



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, IT Security Services, Logical Security, Management Information Systems, Risk Management

Bookmark and Share     0 Comments     RSS Feed     Email a friend


October 6, 2012  12:16 AM

Online Data Communication Access Controls – Part IV



Posted by: Robert Davis
BYOD, Configuration Management, Distributed Platforms, ICT, Information Assets Protection, Information Security, IT Architecture, IT Configuration, IT Infrastructure, Physical Security, Public Key Infrastructure, QoS, Risk Management, Service Delivery

Data encryption as an access control Data encryption provides an additional level of security and privacy over message transmissions. Data encryption is the re-encoding of electronic signals to disguise their meaning....


October 4, 2012  12:24 AM

Online Data Communication Access Controls – Part III



Posted by: Robert Davis
BYOD, Configuration Management, Distributed Platforms, ICT, Information Assets Protection, Information Security, IT Architecture, IT Configuration, IT Infrastructure, Physical Security, QoS, Risk Management, Service Delivery

Message fragmentation as an access control In computer networking, fragmentation is the communication of a message one parcel at a time. The central computer technology, for example, might only accept one byte of a message in each communication with the sending device. To obtain...


September 29, 2012  12:00 AM

Online Data Communication Access Controls – Part II



Posted by: Robert Davis
BYOD, Configuration Management, Distributed Platforms, ICT, Information Assets Protection, Information Security, IT Architecture, IT Configuration, IT Infrastructure, Physical Security, QoS, Risk Management, Service Delivery

Control over access to communication devices may not be effective in an online infrastructure unless access to the employed communication configuration is also restricted. Yet, many online...


September 26, 2012  11:58 PM

Online Data Communication Access Controls – Part I



Posted by: Robert Davis
Access Controls, BYOD, Configuration Management, Distributed Platforms, ICT, Information and Communication Technology, Information Security, IT Architecture, IT Configuration, IT Infrastructure, Physical Security, QoS, Risk Management, Service Delivery

Access to communication devices should be restricted by physical security access controls. As a particular, access to the communication devices should be restricted in much the...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: