IT Governance, Risk, and Compliance:

Echo Check

1

August 4, 2012  12:23 AM

IT Hardware Duplicity and Echo Checks – Part IV



Posted by: Robert Davis
Configuration Management, Control Methods, Echo Check, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, IT Architecture, IT Configuration, IT Hardware, IT Security, Risk Management

Deploying appropriate hardware communication controls Hardware size and accessibility make transportability an issue because of uncertainty that an installed configuration has appropriate controls. Small IT configurations have unique hardware characteristics that distinguish...

August 1, 2012  12:33 AM

IT Hardware Duplicity and Echo Checks – Part III



Posted by: Robert Davis
Configuration Management, Control Methods, Echo Check, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, IT Architecture, IT Configuration, IT Hardware, IT Security, Risk Management

IT echo checking to ensure data integrity and command compliance The control purpose of an IT hardware echo check is to ensure that commands sent to peripheral, or remote, equipment are obeyed and that datum are received correctly. In this activity, the computer checks to ensure...


July 27, 2012  11:39 PM

IT Hardware Duplicity and Echo Checks – Part II



Posted by: Robert Davis
Configuration Management, Control Methods, Echo Check, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, Internet, IT Architecture, IT Configuration, IT Hardware, IT Security, Risk Management

Duplicate operations may be performed on independent IT hardware components or on the same component. Alternatively, the repeat operation may be complimentary to the initial operation, such as where a read is performed after a write to check what was written. Duplicate operations are commonly...


July 25, 2012  12:08 AM

IT Hardware Duplicity and Echo Checks – Part I



Posted by: Robert Davis
Configuration Management, Control Methods, Echo Check, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, Internet, IT Architecture, IT Configuration, IT Hardware, IT Security, Risk Management

[caption id="attachment_1352" align="alignleft" width="285"]

Bookmark and Share     0 Comments     RSS Feed     Email a friend


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: