IT Governance, Risk, and Compliance

Jun 15 2012   9:31PM GMT

Computer Hardware Risks – Part I

Robert Davis Robert Davis Profile: Robert Davis

Some data processing specialist believe that it is unnecessary to devote much attention to hardware deployments. According to this school of thought, modern computer hardware is designed to be very resilient, and most of them have built in protection mechanisms. Consequently, control professionals should encounter effective hardware configurations. In actual practice, however, several factors can reduce IT hardware effectiveness and efficiency.

Common types of IT hardware risk

IT errors may occur due to failures in IT hardware configuration items. Specifically, errors may occur because of a failure in an electronic element or in a mechanical part of computer equipment. The risk to management from weaknesses in hardware controls is considerable because of their pervasive influence on information integrity.

Post Note: “Computer Hardware Risks – Part I” was originally posted on my web page under the title “Computer Hardware Risks”

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: