IT Governance, Risk, and Compliance:

IAP


October 21, 2011  8:29 PM

Auditing Information Assets Protection – Part I



Posted by: Robert Davis
Certified Information Systems Auditor, Certified Information Technology Professional, Certified Internal Auditor, Certified Internal Controls Auditor, Certified Public Accountant, External Audit, IAP, Information Assets Protection, Information Security Governance, Internal Audit, ISG, IT Audit

Failure of an entity to take proper safeguarding precautions can lead to major operational problems and substantial asset loss. Incidents recorded throughout the world continuously reiterate that entities should not ignore information assets protection (IAP) risks and the need for processes to

July 20, 2009  7:28 PM

Biometric Technology – Part IV



Posted by: Robert Davis
Access Controls, Authentication, Biometrics, Crackers, Hackers, IAP, Identification, Information Assets Protection, Information Security, Information Security Infrastructure Management, ISIM

Technology attacks and attendant security compromises are never easily managed. Parallel to the ingenuity of attackers and proportional to the value placed on entrusted information assets, effective security access controls are imperative. Given the current accuracy of automated user...


July 16, 2009  8:31 PM

Biometric Technology – Part III



Posted by: Robert Davis
Access Controls, Authentication, Biometrics, Crackers, Hackers, IAP, Identification, Information Assets Protection, Information Security, Information Security Infrastructure Management, ISIM

Through the identification or authentication process, decisions are made regarding access. Typically, biometric identification supports physical access controls, while biometric authentication...


July 13, 2009  6:25 PM

Biometric Technology – Part II



Posted by: Robert Davis
Access Controls, Authentication, Biometrics, Crackers, Hackers, IAP, Identification, Information Assets Protection, Information Security, Information Security Infrastructure Management, ISIM

Most information security practitioners accept biometrics as the science employing distinctive human attributes to discern access right validity. Specifically, imparting the Information Systems Audit and...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 9, 2009  8:20 PM

Biometric Technology – Part I



Posted by: Robert Davis
Access Controls, Biometrics, Crackers, Hackers, IAP, Information Assets Protection, Information Security, Information Security Infrastructure Management, ISIM

As technological advancements are increasingly immersed in routine human endeavors, few security professionals doubt the criticality for parallel and proportional achievements in information...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


June 9, 2009  9:33 PM

Digital Rights Management – Part IV



Posted by: Robert Davis
DRM, IAP, Information Asset Protection, Information Security Governance, Intellectual Property Right, Internet, Internet Governance, IPR, ISG, Trust Management, WIPO, World Intellectual Property Organization, World Trade Organization, WTO

IPR protection requirements shape complex and challenging management issues. Audio and visual material protection is especially problematic due to the existence of the various known vulnerabilities, and...


June 5, 2009  8:40 PM

Digital Rights Management – Part III



Posted by: Robert Davis
DRM, IAP, Information Asset Protection, Information Security Governance, Intellectual Property Right, Internet, Internet Governance, IPR, ISG, Trust Management, WIPO, World Intellectual Property Organization, World Trade Organization, WTO

DRM software is generally considered an access control technology deployed to limit unauthorized usage. However, arguably, a technology cannot in principle, know what legal restrictions and rights apply in...


June 2, 2009  3:44 PM

Digital Rights Management – Part II



Posted by: Robert Davis
IAP, Information Asset Protection, Information Security Governance, Intellectual Property Right, Internet, Internet Governance, IPR, ISG, Trust Management, WIPO, World Intellectual Property Organization, World Trade Organization, WTO

Intellectual property protection has ushered in an era of technological solutions that attempt to prevent asserted rights infringement. Digital Rights Management (DRM) can be considered a response to legal requirements which criminalize the...


May 29, 2009  7:40 PM

Digital Rights Management – Part I



Posted by: Robert Davis
IAP, Information Asset Protection, Information Security Governance, Intellectual Property Right, Internet, Internet Governance, IPR, ISG, Trust Management

Intellectual property right (IPR) issues affect Information Security Governance as well as Internet Governance deployments through a direct impact on '


May 12, 2009  3:25 PM

Developing Objectives – Part IV



Posted by: Robert Davis
Accountability, Behavioral Management, Benchmarking, Goals, IAP, Information Asset Protection, Information Security Governance, Information Security Management, ISG, ISM, Management by Objectives, MBO, Planning Committee, Resource Allocation, Responsibility

MBO is a participative behavioral approach to managing employees. One of the primary MBO assumptions is that employees prefer to work hard once they are provided with employer expectations. Intuitively, sustaining accepted expectations...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: