Measuring Delivery Value – Part I
Considering adamant demands for continuous process improvements, focus on overall information protection and delivery value in terms of enabled services has become a managerial necessity. Information...
View ArticleMeasuring Delivery Value – Part II
Procedurally, once information security management has analyzed the entity-centric mission, identified stakeholders, and defined objectives; goals must be established with appropriate performance...
View ArticleMeasuring Delivery Value – Part III
Information security service management can include financial and non-financial indicators to enable performance assessments. However, selected indicators must represent a mathematically measurable...
View ArticleMeasuring Delivery Value – Part IV
Performance measurement is a control activity. Measurement techniques are the means for effective information security performance monitoring. “Selective measurement utility is realized when a critical...
View ArticleNetwork Infrastructure Security: Intrusion Detection Systems – Part I
IT decentralization clearly has increased the need for effective network security. In response, entities typically deploy several layers of information security technologies. Furthermore, due to...
View ArticleNetwork Infrastructure Security: Intrusion Detection Systems – Part II
Intrusion detection aids in reacting to network infrastructure incursions. Derivatively, the main value of intrusion detection is early incident or event awareness and subsequent, timely intervention...
View ArticleNetwork Infrastructure Security: Intrusion Detection Systems – Part III
Deployed intrusion detection solutions are not a substitute for firewalls; although they usually complement the function of firewalls. Commonly, a deployed IDS inspects computer activity to identify...
View ArticleNetwork Infrastructure Security: Intrusion Detection Systems – Part IV
As suggested in the aforementioned paragraph, depending on the developer, an entity deployed IDS can have a variety of components and features. However, IDS functionality commonly includes sensors for...
View Article