IT Governance, Risk, and Compliance:

Risk Mitigation


October 27, 2012  2:18 AM

Essential Operating System Protection Mechanisms – Part VI



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

Sustaining information integrity requires operating system protection Usually, IT network environments orchestrate direction and control through an operating system installed to coordinate processes; including application software. In other words, an operating system performs...

October 25, 2012  3:31 AM

Essential Operating System Protection Mechanisms – Part V



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

Bookmark and Share     0 Comments     RSS Feed     Email a friend


October 20, 2012  12:44 AM

Essential Operating System Protection Mechanisms – Part IV



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

Preventing infinite program loops Processor protection deters infinite program loops that could affect availability. Inserting a timer prevents programs from being stuck in infinite loops, and never returning control to the operating system. The operating system timer...


October 18, 2012  1:18 AM

Essential Operating System Protection Mechanisms – Part III



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

  [caption id="attachment_1585" align="alignleft" width="300"]

Bookmark and Share     0 Comments     RSS Feed     Email a friend


October 13, 2012  12:40 AM

Essential Operating System Protection Mechanisms – Part II



Posted by: Robert Davis
Central Processing Unit, Configuration Management, Control Techniques, IAP, ICT, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

Deployable operating system protection mechanisms In most instances, the purpose of operating system protection mechanisms are to prevent programs from interfering with each other during processing and to ensure there are no errors in referencing of subroutines in the program...


October 11, 2012  12:39 PM

Essential Operating System Protection Mechanisms – Part I



Posted by: Robert Davis
BYOD, Central Processing Unit, Configuration Management, Control Techniques, IAP, Information Communication Technology, Information Security, Information Security Infrastructure Management, Infrastructure Management, IT Configuration, IT Controls, IT Infrastructure, IT Security, IT Security Infrastructure, Logical Security, Operational Level Agreement, OS, Risk Management, Risk Mitigation

[caption id="attachment_1562" align="alignleft" width="300"]

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 20, 2011  8:33 PM

Common Risk Determinants for an IT Architecture – Part VIII



Posted by: Robert Davis
COBIT, Control Environment, IT Architecture, Project Management, Risk Management, Risk Mitigation, Risk Tolerance

At the departmental-level, value delivery risks are generally an inducement for the entity’s executive management to designate an IT managerial group (e.g. IT Portfolio Management Committee) or individual (e.g. Chief Information Officer) to oversee


September 16, 2011  9:24 PM

Common Risk Determinants for an IT Architecture – Part VII



Posted by: Robert Davis
COBIT, Control Environment, IT Architecture, Project Management, Risk Management, Risk Mitigation, Risk Tolerance

As a logical assumption, IT project management is a primary governance point for the entity’s ITG program. Therefore, derivatively, management’s CE due diligence regarding IT project governance policies will significantly reduce systems and infrastructure life cycle risks. At the...


September 13, 2011  8:56 PM

Common Risk Determinants for an IT Architecture – Part VI



Posted by: Robert Davis
Audit Oversight Committee, COBIT, Control Environment, Due Diligence, IT Architecture, Project Management, Risk Management, Risk Mitigation, Risk Tolerance

An entity's oversight committee should provide internal and external controls due diligence. In this regard, entity oversight committees normally delegate responsibility, accountability, and authority to an audit oversight committee that: evaluates project controls, interfaces...


September 9, 2011  8:31 PM

Common Risk Determinants for an IT Architecture – Part V



Posted by: Robert Davis
COBIT, Control Environment, IT Architecture, Project Management, Risk Management, Risk Mitigation, Risk Tolerance

IT project governance can only be effective if those influencing project decisions are adequately informed. Project management policies, procedures, rules, and individual responsibilities should be distributed to all affected parties. Furthermore, the risk awareness program...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: