Robert E. Davis's Blog, page 10

October 31, 2010

Information security management: access control convergence - part 2

Integrated policies improving access control are needed to increase safeguarding capabilities. Furthermore, due to technological and operational diversity, it is critical to have standard processes to control access that will permit economies of...
 •  0 comments  •  flag
Share on Twitter
Published on October 31, 2010 23:45

October 27, 2010

Judge orders LimeWire to cease and desist sharing unauthorized music files

As reported in the Wall Street Journal, LimeWire will no longer provide music downloads. According to the filed story, in an order issued on October 26, 2010, “U.S. District Judge Kimba Wood in Manhattan entered a permanent injunction,...
 •  0 comments  •  flag
Share on Twitter
Published on October 27, 2010 15:12

October 25, 2010

Information security management: access control convergence - part 1

Computer technology continues to advance toward a tiered decentralized world of distributed platforms for entering, processing, and retrieving information. Technological implementations are diverse and complex; however, all IT deployments should...
 •  0 comments  •  flag
Share on Twitter
Published on October 25, 2010 13:17

October 20, 2010

A Few Fundamentals of Networking Electronically Encoded Data

In this article select information technology (IT) networking concepts are presented to assist users in understanding today's digitally connected world.
 •  0 comments  •  flag
Share on Twitter
Published on October 20, 2010 15:29

October 18, 2010

Digital Rights Management software

Intellectual property right (IPR) issues affect Information Security Governance as well as Internet Governance deployments through a direct impact on 'Trust Management'. Since knowledge and ideas are an important part of cultural heritage,...
 •  0 comments  •  flag
Share on Twitter
Published on October 18, 2010 07:19

Compliance through Automation: Continuous Monitoring

Commonly, a Management Information System (MIS) is deployed to permit performance monitoring to assess compliance with adopted standards and enable corrective actions and/or process improvements to an entity
 •  0 comments  •  flag
Share on Twitter
Published on October 18, 2010 01:51

October 12, 2010

Information security management: physical token protection - part 2

As a corollary requirement, when considering physical tokens, functionality is directly related to capabilities. Consequently, physical token appropriateness should be evaluated based on the set of attributes applicable to the existing set of...
 •  0 comments  •  flag
Share on Twitter
Published on October 12, 2010 06:19

October 5, 2010

Information security management: physical token protection - part 1

Organizationally, information security normally is considered a program enabling and optimizing IT security services for the entity in order to satisfy business requirements, while simultaneously providing strategic and tactical IT security...
 •  0 comments  •  flag
Share on Twitter
Published on October 05, 2010 21:17

October 3, 2010

Data Communications Risk in Distributed Computing

As the distance between the message source and designated destination increases, accurate transmission becomes increasingly more risky.
 •  0 comments  •  flag
Share on Twitter
Published on October 03, 2010 23:03

September 25, 2010

IT Hardware Validity Checks

IT hardware validity checks are preventive and/or detective control measures that should be implemented to ensure appropriate data processing.
 •  0 comments  •  flag
Share on Twitter
Published on September 25, 2010 10:41