IT Governance, Risk, and Compliance:

Media Errors

1

August 22, 2012  12:49 AM

IT Hardware Validity Checks – Part IV



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, CPU, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Firmware, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Some IT configurations are capable of assigning whole sections of memory for prescribed operations, programs, and/or data. These assigned sections of memory can be protected by a hardware address validity check. This type of control is also known as

August 17, 2012  11:59 PM

IT Hardware Validity Checks – Part III



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, CPU, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Firmware, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Validity checking of datum passed to peripheral devices A data validity check compares characters or fields that are written or read with a set of all valid characters or fields. It is particularly useful technique with peripheral devices such as printers. For example, a...


August 15, 2012  12:34 AM

IT Hardware Validity Checks – Part II



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Infrastructure, IT Security, Media Errors, Risk Management

Information validity implies data elements represent real conditions, rules or relationships rather than physical object characteristics. IT hardware validity checks are preventive and/or detective control measures that should be implemented to ensure appropriate data processing. There are three...


August 11, 2012  12:36 AM

IT Hardware Validity Checks – Part I



Posted by: Robert Davis
Configuration Management, Control Methods, Control Processes, Control Techniques, Digital Storage Devices, EDI, Electronic Commerce, Electronic Data Interchange, Feedback Control, Hardware Controls, Information Communication Technology, Information Security, Infrastructure, Integrity, IT Architecture, IT Configuration, IT Hardware, IT Infrastructure, IT Security, Media Errors, Risk Management

IT hardware validity checks are preventive and/or detective control measures that should be implemented to ensure appropriate data processing. An important component of enabling information integrity is sustaining data and task validity. Within...


October 5, 2009  7:45 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part V



Posted by: Robert Davis
Air Flow, Availability, Boards, Cards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

Decreasing computer hardware replacement cost has not eliminated the need for adequate environmental protection. To avoid humidity corruption, information security managers should verify humidity and temperature levels are maintained within the...


October 1, 2009  11:22 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part IV



Posted by: Robert Davis
Air Flow, Availability, Boards, Cards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

IT can, and does, operate within a wide humidity range. Seasonal humidity changes are usually easier to control than hourly fluctuations. Under either circumstance, normally the primary environmental concern is preventing conditions that permit humidity alterations where condensation is the...


September 28, 2009  6:11 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part III



Posted by: Robert Davis
Air Flow, Availability, Boards, Cards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

When the relative humidity is high, water particulates are formed corresponding to the heat index. High humidity can warp hardware configuration cards. In addition, without adequate insulation, any conditions that cause...


September 24, 2009  7:03 PM

Hardware Protection… Dust, Temperature, and Humidity – Oh My! – Part II



Posted by: Robert Davis
Air Flow, Availability, Boards, Care, Central Processing Unit, CPU, Delivery, Due Diligence, Humidity, Install-and-Forget, Media Errors, Monitoring, Plug-and-Play, Safeguarding, Temperature

Climatically, strategizing optimum environmental conditions for information assets is a managerial safeguarding responsibility....


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: