Binu Anna Eapen

  • Based on accessibility Internet can divided into 3 layers.

    Clear Web or The internet is the surface area indexed by search engines like google, bing, yahoo, facebook etc.

    Deep web is a subset of the […]

  • Big Data is collection of petabytes of data. Cyber security today has to deal with this large amount of disparate data collated from around the enterprise into centralized dashboard which could be in Network […]

    • A major focus of the user studies was to identify challenges in cyber security to explore how visualizations may enable users to meet those challenges. There was not a prescribed set of challenges that users chose from, instead challenges were compiled from study results and then validated with cyber SMEs. Some of these challenges are not surprising, involve the “big-data” problem (velocity, volume, and variety), and have been previously documented in the literature. However, other identified challenges hold opportunities for further research in visual analytics to enhance the abilities of the personnel defending our networks. By understanding the challenges faced by cyber defenders, a visualization can be designed to help address them, increasing
      the tool’s usefulness for the user.

  • The article provides an in-depth overview of the use of data analytics technology in public sector. The focus is given to how data analytics is being used in the government setting. The ability to interpret the […]

  • Last week in class we had discussed about the 3 characteristics of analytical dataset which are the 3 V’s of big data – volume, velocity and variety. In this article the writer adds 3 more V’s that IT, bus […]

  • The driving factor for most cyberattacks or cyber-crime is money. Ransomware is a type of malicious software designed to block access to a computer system/ file until a sum of money is paid. Though the concept of […]

  • A Star Trek themed ransomware named Kirk written in Python targeting 625 different file types has emerged and the attacker are demanding ransom to be paid in virtual currency Monero. The threat is paired with a […]

  • Thanks David for sharing your experience. I think the human element to these frauds makes it easier and vulnerable for an attacker to make his/her move. Human has always been the weakest link to security. However secure the system is, it still remains vulnerable to such frauds. It is a good practice to educate users and customers and making them…[Read more]

  • This report talks about PSCU’s (Payment Solution for Credit Union) proactive partnership to fight against call center fraud. Call center fraud is the act of a criminal impersonating a consumer via a phone channel […]

    • Thanks David for sharing your experience. I think the human element to these frauds makes it easier and vulnerable for an attacker to make his/her move. Human has always been the weakest link to security. However secure the system is, it still remains vulnerable to such frauds. It is a good practice to educate users and customers and making them aware of this like in the case of Barclay because of which you were able to identify and not be cheated.

  • This model shows a common cycle that the attackers use to exploit an organisation. An understanding of this model can help organisation to protect, detect, identify, respond and recover when the organisation is […]

  • Binu Anna Eapen posted a new activity comment 2 months ago

    Nice post Alexandra. With the rise of the concept of big data where in large amount of data is stored and then analyzed for various purposes like finding trend, understanding the customer, or understanding markets, knowing the organization and its employees, it can also be used for analyzing risks, monitoring and identifying threats, More data…[Read more]

  • Binu Anna Eapen posted a new activity comment 2 months ago

    Nicely written Deepali. As mentioned Advertising and marketing are two areas that the Big data is very useful. Big data has made the market more customer oriented and helps with the following
    1. To understand the customer: We see that Amazon and other sites use the information we browse to advertise to us their similar product as Advers even when…[Read more]

  • I agree with you that deep and detailed knowledge about a particular technology can waste excessive time on irrelevant and negligible subjects. But knowing it won’t hurt either. It depends on how he uses the knowledge that he/she has for the audit. Also the perspective of which is important: depth of knowledge or impact on the business depends on…[Read more]

  • I agree with you Blake that the Millennials have a great advantage of having to grow up with the technology. They are quick to learn and well educated. They are ready for change and ready to challenge the norms as you said. All these qualities are traits of a good Auditor or Assurance Professional. One thing that Millennial lack is experience and…[Read more]

  • Binu Anna Eapen posted a new activity comment 2 months ago

    Technology has been ever growing and most often it is a decision that the management has to make whether to incorporate it into the system or not.
    I guess the answer to this question depends who you are in an organization. For example, if I am an application developer, I will be concerned with learning new technologies so as to be in market and…[Read more]

  • Binu Anna Eapen posted a new activity comment 2 months ago

    While the traits mentioned by Dr. Ed Glebstein, Ph.D in his article “Is There Such a Thing as a Bad Auditor” are all undesirable traits of an auditor, in real time we do see such characteristics come by due to the fact that Auditors are also human prone to different behavior. Reading this article one can be aware of their behavior type and mak…[Read more]

  • Binu Anna Eapen posted a new activity comment 2 months ago

    Nice post Alexandra. Lying about your knowledge can be very risky especially because the auditee would most likely be an expertise in that field and would very easily find out if you are lying or not. Not only that it is difficult to fake knowledge for a longer period of time. The Faker can therefore incorrectly determine the risks as he may not…[Read more]

  • With the growing data and its need to be protected, businesses have understood the need of protecting the information. Traditionally the security teams have relied on strong complex multifactor authentication for […]

    • Indeed Binu, SIEM tools are not enough anymore. They are only good at detecting anomalies, such as 10+ failed login authentications, or the network IPs generating the highest firewall traffic. The challenge lies in differentiating anomalies from true malicious behavior, whether it be an attacker masking as an internal employee or an insider threat. SIEMs haven’t been built to detect today’s user behavior-based threats and are not only a challenge to maintain, but also need multiple team members to assure they are working properly. What’s truly needed today is deeper insight into the data being generated every day, to identify threats by monitoring and analyzing all events across the network in real time.

  • Anahi Santiago
    Chief Information Security Officer
    Christiana Care Health System

  • Jimmy Kang
    Senior Manager
    Advisory
    Ernst & Young LLP

  • Duncan Hollis
    Associate Dean of Academic Affairs
    Temple University Beasley School of Law

  • Load More
Skip to toolbar