IT Governance, Risk, and Compliance:

Risk Management


July 10, 2012  11:51 PM

IT Hardware Redundancy Checks Using Parity Bits – Part I



Posted by: Robert Davis
Configuration Management, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, Internet, IT Configuration, IT Hardware, IT Security, Risk Management

When properly deployed, parity bits can be utilized to detect communication errors between IT hardware items and enable corrective measures. Specifically, redundancy checks are a method of inspecting for errors in IT processing. The application of

July 6, 2012  10:32 PM

IT Equipment Functionality and Integrity Checks – Part V



Posted by: Robert Davis
Configuration Management, Digital Storage Devices, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, IT Configuration, IT Hardware, Risk Management

Automatic retry is employed in data communications by retransmission of erroneous messages. Retransmission is utilized in conjunction with an error-detection technology and can involve the retransmission of a character, word, record, or set of records. Verifying the adequacy of equipment...


July 4, 2012  1:01 AM

IT Equipment Functionality and Integrity Checks – Part IV



Posted by: Robert Davis
Configuration Management, Digital Storage Devices, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, IT Configuration, IT Hardware, Risk Management

Automatic retry is also utilized with magnetic tape. Imperfections on the surface of the magnetic tape that interfere with reading or writing can be dislodged by back-spacing the tape and trying again. Whereas, disc drives utilize automatic retry to facilitate successful read/write operations....


June 29, 2012  8:34 PM

IT Equipment Functionality and Integrity Checks – Part III



Posted by: Robert Davis
Configuration Management, Digital Storage Devices, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, IT Configuration, IT Hardware, Risk Management

Correspondingly, the CPU can monitor printer operations to ensure correct print synchronization. This entails the CPU checking print timing to ensure that the image is created when the print device is in the right position. Lastly, data communication facilities may have cybernetic line and...


June 28, 2012  12:00 AM

IT Equipment Functionality and Integrity Checks – Part II



Posted by: Robert Davis
Configuration Management, Digital Storage Devices, Hardware Controls, Information Security, Infrastructure Management, IT Hardware, Risk Management

Forms of automatic error diagnosis routines Automatic error diagnosis is utilized by several hardware configuration components. A typical application is the installation of Central Processing Unit (CPU) circuitry to...


June 23, 2012  12:00 AM

IT Equipment Functionality and Integrity Checks – Part I



Posted by: Robert Davis
Configuration Management, Digital Storage Devices, Hardware Controls, Information Security, Infrastructure Management, IT Hardware, Risk Management

Collectively, the term IT hardware describes all equipment necessary to enable IT services utilization. Yet, each hardware configuration item may have distinct operational characteristics...


June 19, 2012  11:24 PM

Computer Hardware Risks – Part II



Posted by: Robert Davis
Configuration Management, Digital Storage Devices, Hardware Controls, Infrastructure Management, IT Hardware, Risk Management

Impact of IT hardware failures on information integrity Failure of a semiconductor, diode, or transistor may affect the electrical impulses utilized in the processing of data, the storage of data, and the communication of data between different equipment in the IT...


June 15, 2012  9:31 PM

Computer Hardware Risks – Part I



Posted by: Robert Davis
Configuration Management, Digital Storage Devices, Hardware Controls, Infrastructure Management, IT Hardware, Risk Management

Some data processing specialist believe that it is unnecessary to devote much attention to hardware deployments. According to this school of thought, modern computer hardware is designed to be very resilient, and most of them have built in protection mechanisms. Consequently, control...


March 6, 2012  8:43 PM

Auditing IT Governance – Part VIII



Posted by: Robert Davis
Certified Information Systems Auditor, Certified Information Technology Professional, Certified Internal Auditor, Certified Internal Controls Auditor, Certified Public Accountant, External Audit, Internal Audit, IT Audit, ITG, Performance Measurement, Resource Management, Risk Management, Strategic Alignment, Value Delivery

Regarding audit staffing, potential IT governance engagement members should have the appropriate seniority and proficiency. Generally, when IT governance audit objectives involve a wide range of information system functions, assigned audit personnel should have extensive organizational...


March 2, 2012  10:12 PM

Auditing IT Governance – Part VII



Posted by: Robert Davis
Certified Information Systems Auditor, Certified Information Technology Professional, Certified Internal Auditor, Certified Internal Controls Auditor, Certified Public Accountant, External Audit, Internal Audit, IT Audit, ITG, Performance Measurement, Resource Management, Risk Management, Strategic Alignment, Value Delivery

An IT auditor should include in the audit ambit relevant processes for planning, organizing, and monitoring the IT activity. Contextually, the audit ambit should include control systems for the use and protection of the full range of COBIT framework IT resources. Whereby, specifically;...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: