Robert E. Davis's Blog, page 9

December 26, 2010

Information security management: measuring performance - part 2

Do you like this story?Maturity modeling utilizing benchmarking techniquesIT security maturity modeling can measure the established control environment and controls within processes. Typically, the defined maturity modeling scale addresses entity-centric processes from...
 •  0 comments  •  flag
Share on Twitter
Published on December 26, 2010 16:47

December 18, 2010

Information security management: measuring performance - part 1

Do you like this story?Though IT security service management can include a plethora of indicators, adequate service value measurement is not demonstrated in the sheer number of indicators considered. Practical IT security service delivery and support utilization...
 •  0 comments  •  flag
Share on Twitter
Published on December 18, 2010 09:26

December 12, 2010

Information security management: legal compliance alignment - part 2

There are numerous global, regional as well as national laws and regulations focusing on information assets protection (IAP) requiring professional consideration. In particular, at the global level, the World Intellectual Property...[image error]
 •  0 comments  •  flag
Share on Twitter
Published on December 12, 2010 08:51

December 4, 2010

Information security management: legal compliance alignment - part 1

Institutionalized information security governance defines the information assets safeguarding perimeter inside which an entity should operate. Whereas, legal compliance management ensures structural boundary segments are sturdy and the entity...[image error]
 •  0 comments  •  flag
Share on Twitter
Published on December 04, 2010 20:00

November 29, 2010

Information security management: electronic commerce - part 2

EDI is commonly defined as the transfer of data between different companies utilizing networks. Inadvertent data loss during transmission reduces the cost savings generally associated with EDI deployment. Furthermore, message integrity issues can...
 •  0 comments  •  flag
Share on Twitter
Published on November 29, 2010 03:07

November 22, 2010

Information security management: electronic commerce - part 1

With an ever-increasing number of organizations and individuals relying on the Internet to exchange confidential and sensitive information, adequate message security continues to be a technological management concern. Serviceable standard...
 •  0 comments  •  flag
Share on Twitter
Published on November 22, 2010 04:23

November 15, 2010

Service Level Management of Cloud Computing

Service Level Management (SLM) defines, negotiates, controls, reports and monitors agreed-upon service levels within predefined standard service parameters.
 •  0 comments  •  flag
Share on Twitter
Published on November 15, 2010 11:32

Information security management: critical incident response elements – part 2

There exist various theories concerning managing employees during a crisis scenario. Nevertheless, security incident response tactics should be viewed as a unique application of contingency management theory that can be coupled with sound risk...
 •  0 comments  •  flag
Share on Twitter
Published on November 15, 2010 04:55

November 12, 2010

Online Data Communication Access Controls

Access controls over communication devices may not be effective in an online infrastructure unless certain communication techniques are deployed.
 •  0 comments  •  flag
Share on Twitter
Published on November 12, 2010 19:44

November 8, 2010

Information security management: critical incident response elements – part 1

Information technology is completely secure when resources are utilized and accessed as intended under all circumstances. Through delegation, every entity manager assumes responsibility for maintaining an adequate control system that safeguards...
 •  0 comments  •  flag
Share on Twitter
Published on November 08, 2010 02:38