IT Governance, Risk, and Compliance:

Infrastructure


September 8, 2012  12:14 AM

Data Communications Risk in Distributed Computing – Part V



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Security, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

Reducing data communication error risk for teleprocessing systems Teleprocessing is the handling of data through a communications channel, such as...

September 5, 2012  7:56 PM

Data Communications Risk in Distributed Computing – Part IV



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

Signal fading is a decline in transmission strength. Fading can occur when a signal is transmitted by microwaves. Under certain conditions, the signal picked up by the receiving unit can be quite weak. A weak signal is more susceptible to transmission noise and error. Signal...


August 31, 2012  11:31 PM

Data Communications Risk in Distributed Computing – Part III



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

The electrical signal may be changed by mechanical component failure of the communications network, or by a problem related to the characteristics of data communications. Of these two error sources, the characteristics of data communications are by far more important. Root causes of most...


August 29, 2012  2:00 PM

Data Communications Risk in Distributed Computing – Part II



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

A common type of data communications risk According to Christopher E. Strangio, the distance over which data moves within IT can vary from a few thousandths of an inch, as is the case within a single integrated circuit (IC) chip, to several feet along the main circuit board’s...


August 25, 2012  12:09 AM

Data Communications Risk in Distributed Computing – Part I



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

As the distance between the message source and designated destination increases, accurate transmission becomes increasingly more risky. Data communication systems are designed with transmission speed and capacity to meet the timeliness and volume needs of defined users. Nonetheless, data...


August 22, 2012  12:49 AM

IT Hardware Validity Checks – Part IV



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, CPU, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Firmware, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Some IT configurations are capable of assigning whole sections of memory for prescribed operations, programs, and/or data. These assigned sections of memory can be protected by a hardware address validity check. This type of control is also known as


August 17, 2012  11:59 PM

IT Hardware Validity Checks – Part III



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, CPU, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Firmware, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Validity checking of datum passed to peripheral devices A data validity check compares characters or fields that are written or read with a set of all valid characters or fields. It is particularly useful technique with peripheral devices such as printers. For example, a...


August 15, 2012  12:34 AM

IT Hardware Validity Checks – Part II



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Information validity implies data elements represent real conditions, rules or relationships rather than physical object characteristics. IT hardware validity checks are preventive and/or detective control measures that should be implemented to ensure appropriate data processing. There are three...


August 11, 2012  12:36 AM

IT Hardware Validity Checks – Part I



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Hardware, IT Infrastructure, IT Security, Media Errors, Risk Management

IT hardware validity checks are preventive and/or detective control measures that should be implemented to ensure appropriate data processing. An important component of enabling information integrity is sustaining data and task validity. Within...


June 12, 2012  9:46 PM

What Every IT Manager Should Know About Service Delivery and Support – Part XII



Posted by: Robert Davis
Audit, COBIT, Control Environment, Control Methods, Ethics, Human Resources, Infrastructure, Integrity, ISACA, ISO, IT Audit, ITSM, Organizational Structure, Service Delivery, Systems

Audit professionals have a significant role in supporting an adequate control environment when providing contributions to strategic, tactical, and operational value through governance improvement recommendations. Consistent with entity oversight responsibilities, board of directors should insist...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: