IT Governance, Risk, and Compliance:

IAP


October 27, 2012  2:18 AM

Essential Operating System Protection Mechanisms – Part VI



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

Sustaining information integrity requires operating system protection Usually, IT network environments orchestrate direction and control through an operating system installed to coordinate processes; including application software. In other words, an operating system performs...

October 25, 2012  3:31 AM

Essential Operating System Protection Mechanisms – Part V



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

Bookmark and Share     0 Comments     RSS Feed     Email a friend


October 20, 2012  12:44 AM

Essential Operating System Protection Mechanisms – Part IV



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

Preventing infinite program loops Processor protection deters infinite program loops that could affect availability. Inserting a timer prevents programs from being stuck in infinite loops, and never returning control to the operating system. The operating system timer...


October 18, 2012  1:18 AM

Essential Operating System Protection Mechanisms – Part III



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

  [caption id="attachment_1585" align="alignleft" width="300"]

Bookmark and Share     0 Comments     RSS Feed     Email a friend


October 13, 2012  12:40 AM

Essential Operating System Protection Mechanisms – Part II



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

Deployable operating system protection mechanisms In most instances, the purpose of operating system protection mechanisms are to prevent programs from interfering with each other during processing and to ensure there are no errors in referencing of subroutines in the program...


October 11, 2012  12:39 PM

Essential Operating System Protection Mechanisms – Part I



Posted by: Robert Davis
BYOD, Central Processing Unit, Configuration Management, Control Techniques, IAP, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

[caption id="attachment_1562" align="alignleft" width="300"]

Bookmark and Share     0 Comments     RSS Feed     Email a friend


May 1, 2012  10:24 PM

Managing the IT Configuration – Part VIII



Posted by: Robert Davis
Change Control, Change Management, CMDB, Configuration Management, IAP, Information Assets Protection, Infrastructure, IT Infrastructure, ITIM, Problem Management, Release Management, Service Delivery, Systems

An IT maintenance request requires analysis of all incidents and problems generated in the entity’s production environment. However, assigned IT service support personnel should make problem evaluation their final step prior to correction. Sequentially, within the evaluation process, an...


April 27, 2012  10:19 PM

Managing the IT Configuration – Part VII



Posted by: Robert Davis
Change Control, Change Management, CMDB, Configuration Management, IAP, Information Assets Protection, Infrastructure, IT Infrastructure, ITIM, Problem Management, Release Management, Service Delivery, Systems

An IT service problem can be viewed as a demarcated and identified condition extracted from a single incident or multiple incidents exhibiting common symptoms. Initially, the IT service problem is an unknown...


April 25, 2012  2:51 PM

Managing the IT Configuration – Part VI



Posted by: Robert Davis
Change Control, Change Management, CMDB, Configuration Management, IAP, Incident Management, Information Assets Protection, Infrastructure, IT Infrastructure, ITIM, Release Management, Service Delivery, Systems

Cascading from the primary release management objective, the primary release management goal should be to ensure approved and accredited components are installed malfunction-resistant and on schedule. Consequently, the high level activities associated with this process should encompass: release...


April 20, 2012  8:41 PM

Managing the IT Configuration – Part V



Posted by: Robert Davis
Change Control, Change Management, CMDB, Configuration Management, IAP, Information Assets Protection, Infrastructure, IT Infrastructure, ITIM, Release Management, Service Delivery, Systems

Once change tests prove satisfactory functionality, most IT CIs should be moved to a secure staging area. Subsequently, a release request should be submitted to the appropriate individual for production implementation. Upon notification of a successfully released change, documentation updates...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: