IT Governance, Risk, and Compliance:

ICT


October 13, 2012  12:40 AM

Essential Operating System Protection Mechanisms – Part II



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

Deployable operating system protection mechanisms In most instances, the purpose of operating system protection mechanisms are to prevent programs from interfering with each other during processing and to ensure there are no errors in referencing of subroutines in the program...

October 6, 2012  12:16 AM

Online Data Communication Access Controls – Part IV



Posted by: Robert Davis
BYOD, Configuration Management, Distributed Platforms, ICT, Information Assets Protection, Information Security, IT Architecture, IT Configuration, IT Infrastructure, Physical Security, Public Key Infrastructure, QoS, Risk Management, Service Delivery

Data encryption as an access control Data encryption provides an additional level of security and privacy over message transmissions. Data encryption is the re-encoding of electronic signals to disguise their meaning....


October 4, 2012  12:24 AM

Online Data Communication Access Controls – Part III



Posted by: Robert Davis
BYOD, Configuration Management, Distributed Platforms, ICT, Information Assets Protection, Information Security, IT Architecture, IT Configuration, IT Infrastructure, Physical Security, QoS, Risk Management, Service Delivery

Message fragmentation as an access control In computer networking, fragmentation is the communication of a message one parcel at a time. The central computer technology, for example, might only accept one byte of a message in each communication with the sending device. To obtain...


September 29, 2012  12:00 AM

Online Data Communication Access Controls – Part II



Posted by: Robert Davis
BYOD, Configuration Management, Distributed Platforms, ICT, Information Assets Protection, Information Security, IT Architecture, IT Configuration, IT Infrastructure, Physical Security, QoS, Risk Management, Service Delivery

Control over access to communication devices may not be effective in an online infrastructure unless access to the employed communication configuration is also restricted. Yet, many online...


September 26, 2012  11:58 PM

Online Data Communication Access Controls – Part I



Posted by: Robert Davis
Access Controls, BYOD, Configuration Management, Distributed Platforms, ICT, Information and Communication Technology, Information Security, IT Architecture, IT Configuration, IT Infrastructure, Physical Security, QoS, Risk Management, Service Delivery

Access to communication devices should be restricted by physical security access controls. As a particular, access to the communication devices should be restricted in much the...


September 22, 2012  12:07 AM

A Few Fundamentals of Networking Electronically Encoded Data – Part IV



Posted by: Robert Davis
Central Processing Unit, Configuration Management, CPU, ICT, Information Communication Technology, IT Architecture, IT Configuration, Multiplexor, Risk Management, Service Delivery, Token, Transport Mode, Tunnel Mode, Virtual Private Network

In TDM (typically utilized for digital signals) a device is given a specific time slot during which it can utilize a particular channel. In contrast, with FDM (typically utilized for analog signals) the channel is subdivided into sub-channels, each with a different frequency width that is assigned...


September 20, 2012  1:09 AM

A Few Fundamentals of Networking Electronically Encoded Data – Part III



Posted by: Robert Davis
Central Processing Unit, Configuration Management, CPU, ICT, Information Communication Technology, IT Architecture, IT Configuration, Multiplexor, Risk Management, Service Delivery, Token, Transport Mode, Tunnel Mode, Virtual Private Network

Packet assembly and disassembly between telecommunication links Input or output (I/O) channels are paths along which datum are transmitted to and from primary storage. These communication channels also handle the transfer of datum to and from I/O devices. As a result, this...


September 15, 2012  12:24 AM

A Few Fundamentals of Networking Electronically Encoded Data – Part II



Posted by: Robert Davis
Configuration Management, ICT, Information Communication Technology, IT Architecture, IT Configuration, IT Infrastructure, IT Service Delivery, Multiplexor, Risk Management, Service Delivery, Token, Transport Mode, Tunnel Mode, Virtual Private Network

All of the computers and other hardware connected to a particular network must follow the same rules or operations commonly called protocols. Operational rules are typically divided up into layers so a programmer or network administrator need only be concerned with the layer with which the...


September 13, 2012  12:42 AM

A Few Fundamentals of Networking Electronically Encoded Data – Part I



Posted by: Robert Davis
ICT, Information Communication Technology, IT Architecture, IT Configuration, IT Infrastructure, IT Service Delivery, Multiplexor, Risk Management, Service Delivery, Token, Tunnel Mode, Virtual Private Network

Any distributed IT infrastructure requires a complex set of communication functions for proper operation. Many of these functions, such as reliability mechanisms, are common across IT architectures. Thus, the communication task is generally viewed as consisting of a modular architecture, in which...


July 27, 2010  3:28 PM

Not-for-profit Risk Management – Part VIII



Posted by: Robert Davis
COBIT, Educational Institutions, Enterprise Governance, Entity Governance, Governance Tree, Government Agencies, ICT, IT Architecture, IT Service Management, ITG, ITSM, Performance Measurement, Risk Assessment, Risk Management, Risk Tolerance, Strategic Planning, Value Delivery

Deploying Enterprise Governance bilaterally connected to IT Governance enables management to focus on value creation drivers that move an entity forward and sustain proper as well as adequate controls. ...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: