IT Governance, Risk, and Compliance:

Exception Reporting Systems


December 8, 2012  1:34 AM

Network Infrastructure Security: Intrusion Detection Systems – Part VI



Posted by: Robert Davis
Access Controls, Availability Management, Configuration Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Information Assets Protection, IT Security Infrastructure, Logical Security, Management Information Systems, Risk Management

Network-based intrusion detection captures traffic and performs analyses to identify notable events. If placed at the front-end IT perimeter, the properly configured network-based IDS will detect all externally initiated attack attempts, even where the firewall subsequently permits...

December 5, 2012  11:32 PM

Network Infrastructure Security: Intrusion Detection Systems – Part V



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, Logical Security, Management Information Systems, Risk Management

Bookmark and Share     0 Comments     RSS Feed     Email a friend


December 1, 2012  12:09 AM

Network Infrastructure Security: Intrusion Detection Systems – Part IV



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, IT Security Services, Logical Security, Management Information Systems, Risk Management

As suggested in the aforementioned paragraph, depending on the...


November 29, 2012  1:41 AM

Network Infrastructure Security: Intrusion Detection Systems – Part III



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, IT Security Services, Logical Security, Management Information Systems, Risk Management

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 24, 2012  12:12 AM

Network Infrastructure Security: Intrusion Detection Systems – Part II



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, IT Security Services, Logical Security, Management Information Systems, Risk Management

Intrusion detection aids in reacting to network infrastructure incursions. Derivatively, the main value of intrusion detection is early incident or event awareness and subsequent, timely intervention resulting in a loss experience that is less than what might otherwise ensue from a security breach....


November 21, 2012  6:28 PM

Network Infrastructure Security: Intrusion Detection Systems – Part I



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, IT Security Services, Logical Security, Management Information Systems, Risk Management

Bookmark and Share     0 Comments     RSS Feed     Email a friend


October 18, 2010  12:48 PM

Compliance through Automation: Continuous Monitoring – Part VIII



Posted by: Robert Davis
Compliance Management, Compliance Verification Systems, Continuous Monitoring, Control System, Data Provisioning, Decision Techniques, Enterprise Resource Planning, ERP, Exception Reporting Systems, Expert Systems, Inference Engine, Knowledge Acquisition, Knowledge Engineer, Knowledge-base, Management Information Systems, MIS

Since management is responsible for the entity’s controls, they should have the means to determine, on an ongoing basis, whether selected controls are operating as designed. Continuous monitoring typically addresses management’s responsibility to assess the adequacy and effectiveness of...


October 14, 2010  3:21 PM

Compliance through Automation: Continuous Monitoring – Part VII



Posted by: Robert Davis
Compliance Management, Compliance Verification Systems, Continuous Monitoring, Control System, Data Provisioning, Decision Techniques, Enterprise Resource Planning, ERP, Exception Reporting Systems, Expert Systems, Inference Engine, Knowledge Acquisition, Knowledge Engineer, Knowledge-base, Management Information Systems, MIS

Continuous monitoring allows management to have greater insight into the entity’s current state of compliance. Typically, for IT, continuous monitoring involves...


October 11, 2010  6:02 PM

Compliance through Automation: Continuous Monitoring – Part VI



Posted by: Robert Davis
Compliance Management, Compliance Verification Systems, Continuous Monitoring, Control System, Data Provisioning, Decision Techniques, Enterprise Resource Planning, ERP, Exception Reporting Systems, Expert Systems, Inference Engine, Knowledge Acquisition, Knowledge Engineer, Knowledge-base, Management Information Systems, MIS

To ensure effective continuous monitoring, adequate segregation-of-functions must be sustained. Continuous monitoring and segregation-of-functions are not new control concepts. Yet,...


October 7, 2010  12:28 PM

Compliance through Automation: Continuous Monitoring – Part V



Posted by: Robert Davis
Compliance Management, Compliance Verification Systems, Continuous Monitoring, Control System, Data Provisioning, Decision Techniques, Enterprise Resource Planning, ERP, Exception Reporting Systems, Expert Systems, Inference Engine, Knowledge Acquisition, Knowledge Engineer, Knowledge-base, Management Information Systems, MIS

According to The Institute of Internal Auditors, “Continuous monitoring of controls is a process that management puts in place to ensure that its policies and procedures are adhered to, and that business processes are...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: