Quantcast
Channel: IT Governance, Risk, and Compliance » IT Configuration
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Online Data Communication Access Controls – Part I

Access to communication devices should be restricted by physical security access controls. As a particular, access to the communication devices should be restricted in much the same way that access is...

View Article



Online Data Communication Access Controls – Part II

Control over access to communication devices may not be effective in an online infrastructure unless access to the employed communication configuration is also restricted. Yet, many online...

View Article

Online Data Communication Access Controls – Part III

Message fragmentation as an access control In computer networking, fragmentation is the communication of a message one parcel at a time. The central computer technology, for example, might only accept...

View Article

Online Data Communication Access Controls – Part IV

Data encryption as an access control Data encryption provides an additional level of security and privacy over message transmissions. Data encryption is the re-encoding of electronic signals to...

View Article

Image may be NSFW.
Clik here to view.

Essential Operating System Protection Mechanisms – Part I

Third Generation iPod Nano With Embedded Operating System 1.1.3 From mainframe computers to industrial robots to cellular phones, a variety of operating systems are available for deployment....

View Article


Essential Operating System Protection Mechanisms – Part II

Deployable operating system protection mechanisms In most instances, the purpose of operating system protection mechanisms are to prevent programs from interfering with each other during processing and...

View Article

Image may be NSFW.
Clik here to view.

Essential Operating System Protection Mechanisms – Part III

  Intel Central Processing Unit (CPU) A potential consequence for a breach in memory protection is a halt in all current processing. Therefore, the operating system should monitor the partitions to...

View Article

Essential Operating System Protection Mechanisms – Part IV

Preventing infinite program loops Processor protection deters infinite program loops that could affect availability. Inserting a timer prevents programs from being stuck in infinite loops, and never...

View Article


Image may be NSFW.
Clik here to view.

Essential Operating System Protection Mechanisms – Part V

Technically, the user program subroutine integration process is known as linkage editing. Linkage editing poses two risks: the unauthorized use of subroutines and the unauthorized suppression of...

View Article


Essential Operating System Protection Mechanisms – Part VI

Sustaining information integrity requires operating system protection Usually, IT network environments orchestrate direction and control through an operating system installed to coordinate processes;...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images