IT Governance, Risk, and Compliance:

Management Information Systems


December 8, 2012  1:34 AM

Network Infrastructure Security: Intrusion Detection Systems – Part VI



Posted by: Robert Davis
Access Controls, Availability Management, Configuration Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Information Assets Protection, IT Security Infrastructure, Logical Security, Management Information Systems, Risk Management

Network-based intrusion detection captures traffic and performs analyses to identify notable events. If placed at the front-end IT perimeter, the properly configured network-based IDS will detect all externally initiated attack attempts, even where the firewall subsequently permits...

December 5, 2012  11:32 PM

Network Infrastructure Security: Intrusion Detection Systems – Part V



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, Logical Security, Management Information Systems, Risk Management

Bookmark and Share     0 Comments     RSS Feed     Email a friend


December 1, 2012  12:09 AM

Network Infrastructure Security: Intrusion Detection Systems – Part IV



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, IT Security Services, Logical Security, Management Information Systems, Risk Management

As suggested in the aforementioned paragraph, depending on the...


November 29, 2012  1:41 AM

Network Infrastructure Security: Intrusion Detection Systems – Part III



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, IT Security Services, Logical Security, Management Information Systems, Risk Management

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 24, 2012  12:12 AM

Network Infrastructure Security: Intrusion Detection Systems – Part II



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, IT Security Services, Logical Security, Management Information Systems, Risk Management

Intrusion detection aids in reacting to network infrastructure incursions. Derivatively, the main value of intrusion detection is early incident or event awareness and subsequent, timely intervention resulting in a loss experience that is less than what might otherwise ensue from a security breach....


November 21, 2012  6:28 PM

Network Infrastructure Security: Intrusion Detection Systems – Part I



Posted by: Robert Davis
Access Controls, Availability Management, Continuous Monitoring, Control Techniques, Distributed Platforms, Exception Reporting Systems, Hackers, Information Assets Protection, IT Security Infrastructure, IT Security Services, Logical Security, Management Information Systems, Risk Management

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 8, 2012  12:14 AM

Data Communications Risk in Distributed Computing – Part V



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Security, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

Reducing data communication error risk for teleprocessing systems Teleprocessing is the handling of data through a communications channel, such as...


September 5, 2012  7:56 PM

Data Communications Risk in Distributed Computing – Part IV



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

Signal fading is a decline in transmission strength. Fading can occur when a signal is transmitted by microwaves. Under certain conditions, the signal picked up by the receiving unit can be quite weak. A weak signal is more susceptible to transmission noise and error. Signal...


August 31, 2012  11:31 PM

Data Communications Risk in Distributed Computing – Part III



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

The electrical signal may be changed by mechanical component failure of the communications network, or by a problem related to the characteristics of data communications. Of these two error sources, the characteristics of data communications are by far more important. Root causes of most...


August 29, 2012  2:00 PM

Data Communications Risk in Distributed Computing – Part II



Posted by: Robert Davis
Capacity Management, Configuration Management, Distributed Platforms, Information Communication Technology, Infrastructure, Infrastructure Management, IT Architecture, IT Configuration, IT Infrastructure, IT Support, Management Information Systems, Message Integrity, Risk Management, Service Delivery and Support

A common type of data communications risk According to Christopher E. Strangio, the distance over which data moves within IT can vary from a few thousandths of an inch, as is the case within a single integrated circuit (IC) chip, to several feet along the main circuit board’s...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: