IT Governance, Risk, and Compliance:

IT Hardware


November 17, 2012  1:58 AM

A Few Fundamental Features of IPv6 Internetworking – Part VI



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Public Key Infrastructure, Service Delivery, Transport Mode, Tunnel Mode

Why understanding IPv6 is important to end-users Currently, the dominant internetworking protocol is Internet Protocol version 4 (IPv4). Yet, each IPv4 address is limited to a thirty-two bit field length, which corresponds...

November 15, 2012  2:54 AM

A Few Fundamental Features of IPv6 Internetworking – Part V



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Public Key Infrastructure, Service Delivery, Transport Mode, Tunnel Mode

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 10, 2012  2:40 AM

A Few Fundamental Features of IPv6 Internetworking – Part IV



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Service Delivery

Upon arrival at the destination, the original internetworking message is reassembled in the correct order, based on the imprinted packet sequence number. Thus a virtual connection is established with the end-station through a

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 8, 2012  1:20 AM

A Few Fundamental Features of IPv6 Internetworking – Part III



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet, Internet Governance, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Service Delivery

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 2, 2012  11:13 PM

A Few Fundamental Features of IPv6 Internetworking – Part II



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet, Internet Governance, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Service Delivery

Packet-switched networking model As presented in the article A Few Fundamentals of Networking Electronically Encoded Data, data must be organized for transmission. Thus, the creation of usable telecommunication packets requires appending a unique header to the message destined...


November 1, 2012  3:28 AM

A Few Fundamental Features of IPv6 Internetworking – Part I



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet, Internet Governance, Internet Protocol Security, IPSec, IT Architecture, IT Hardware, IT Security, Multiprocessing, Service Delivery

The Internet is a worldwide system of computer networks in which users at any one computer can, if they have permission, get information from any other connected computer. Internet protocols are a support structure for...


August 11, 2012  12:36 AM

IT Hardware Validity Checks – Part I



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Hardware, IT Infrastructure, IT Security, Media Errors, Risk Management

IT hardware validity checks are preventive and/or detective control measures that should be implemented to ensure appropriate data processing. An important component of enabling information integrity is sustaining data and task validity. Within...


August 4, 2012  12:23 AM

IT Hardware Duplicity and Echo Checks – Part IV



Posted by: Robert Davis
Configuration Management, Control Methods, Echo Check, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, IT Architecture, IT Configuration, IT Hardware, IT Security, Risk Management

Deploying appropriate hardware communication controls Hardware size and accessibility make transportability an issue because of uncertainty that an installed configuration has appropriate controls. Small IT configurations have unique hardware characteristics that distinguish...


August 1, 2012  12:33 AM

IT Hardware Duplicity and Echo Checks – Part III



Posted by: Robert Davis
Configuration Management, Control Methods, Echo Check, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, IT Architecture, IT Configuration, IT Hardware, IT Security, Risk Management

IT echo checking to ensure data integrity and command compliance The control purpose of an IT hardware echo check is to ensure that commands sent to peripheral, or remote, equipment are obeyed and that datum are received correctly. In this activity, the computer checks to ensure...


July 27, 2012  11:39 PM

IT Hardware Duplicity and Echo Checks – Part II



Posted by: Robert Davis
Configuration Management, Control Methods, Echo Check, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, Internet, IT Architecture, IT Configuration, IT Hardware, IT Security, Risk Management

Duplicate operations may be performed on independent IT hardware components or on the same component. Alternatively, the repeat operation may be complimentary to the initial operation, such as where a read is performed after a write to check what was written. Duplicate operations are commonly...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: