-
Daniel Warner posted a new activity comment 8 years ago
Daniel,
That’s pretty wild, I was under the assumption that most companies were able to remove any access employees had the day the employee leaves, but that is eye-opening.
-
Daniel Warner posted a new activity comment 8 years ago
Priya,
Great post, I like how you segmented out the different protocols from each layer. I was talking to someone in my company’s IT department, and a point he made was that the OSI model gives some framework to an IT worker who is trying to sort out an issue. For example, if users lose access to email, whoever is trying to fix the issue c…[Read more]
-
Daniel Warner posted a new activity comment 8 years ago
What are the advantages of VPN?
• A VPN (virtual private network) is a way of connecting to another network securing over the internet.
• Advantages of VPN are:
o Data encryption – Data is encrypted when sent over a VPN, which can help the security of the data if the network is entered by a hacker
o Low cost
o Employees can access the netwo…[Read more] -
Daniel Warner posted a new activity comment 8 years ago
What is an OSI Model? What is the main function of each layer?
• The OSI model is a seven-layer hierarchical model that shows the communication and data flow through each computer system.
o Physical (Layer 1)
The physical components (cabling, etc) that keep the network together.
o Data Link (Layer 2)
This layer includes switches and links…[Read more] -
Daniel Warner posted a new activity comment 8 years ago
2. List common control issues associated with operating systems and remediation strategy/plan
Common control issues that can affect an operating system are:
• High amount of access and share permissions granted
• Lack of malware and firewall protection
• Weak password policy
• Poor patch managementA way to remediate these issues is to:…[Read more]
-
Daniel Warner posted a new activity comment 8 years ago
2. List common control issues associated with operating systems and remediation strategy/plan
Common control issues that can affect an operating system are:
• High amount of access and share permissions granted
• Lack of malware and firewall protection
• Weak password policy
• Poor patch managementA way to remediate these issues…[Read more]
-
Daniel Warner commented on the post, Week 4 & 5 Questions, on the site 8 years ago
1. Why is it so important to protect the operating system?
a. The operating system can be viewed as the foundation for the computer, because the hardware and operating system need to communicate in order to reach the computer’s full potential. The operating system organizes the software and hardware of a computer and also, “acts as a sch…[Read more] -
Daniel Warner commented on the post, Week 4 & 5 Questions, on the site 8 years ago
Great post Binu,
You mentioned hashing passwords with salt, which is something I’d heard about but honestly had no idea what it was. This caused me to research hashing a password with salt, and its use in defense against a brute force attack. Thanks!
-
Daniel Warner commented on the post, Week 4 & 5 Questions, on the site 8 years ago
These are all great points guys,
A friend’s company (30 employees) had an issue that could have been mitigated with a policy like the ones you’ve described. An intern had found a thumb drive on the ground over the weekend, and when he came in to work on Monday had plugged it in to the USB port. The thumb drive was full of malware that had…[Read more] -
Daniel Warner posted a new activity comment 8 years, 1 month ago
3. List risks associated with database management systems (DBMS)
-A DBMS is in contact with several different business applications, thus if data is corrupted in a record then that piece of corrupted data can flow over to many different applications that are using that record from the database.
-Large amounts of sensitive data are stored in a…[Read more] -
Daniel Warner commented on the post, Weekly Question #4: Complete by February 15, 2017, on the site 8 years, 1 month ago
Ming, I agree with you and have seen this in my current job. When handling our client’s data they can be resistant to giving us an entire table sometimes, and will instead create temp tables and then send the temp tables over. As you can imagine this can be problematic because they temp tables may be missing key information we need.
-
Daniel Warner posted a new activity comment 8 years, 1 month ago
2. Key Benefits of relational databases vs. traditional file system.
– I think a major benefit of a relational database is the ability to query and manipulate data as opposed to a traditional file system or flat file.
– A user can utilize SQL to run queries to get the results of the data that the user needs.
– Many users have access to the…[Read more] -
Daniel Warner posted a new activity comment 8 years, 1 month ago
1 Key Characteristics of RDMS
• RDMS’s are created to store large amounts of data that the applications of the business will use in their day-to-day activities.
• Data is stored in tables.
• The rows of the table identify a record, and the columns of the table identify a characteristic of that record
• A Data Dictionary that identifie…[Read more] -
Daniel Warner posted a new activity comment 8 years, 1 month ago
Why do we need control framework to guide IT auditing?
A control framework is important because it provides a basis for the IT auditor to compare the organizations controls to. With a control framework measurement of a control is possible because there exists a baseline (control framework) to compare the issues or control in question…[Read more] -
Daniel Warner posted a new activity comment 8 years, 1 month ago
Comparing ITIL and COBIT: list some key similarities and difference based on your understanding
The COBIT model highlights control activities and control objectives. The structure that is broken down into four areas: plan and organize, acquire and implement, deliver and support, and monitor and evaluate. Within each of these controls objectives…[Read more] -
Daniel Warner posted a new activity comment 8 years, 1 month ago
1. Explain the key IT Audit phases
2. What are some key activities within each phasePlanning-
-This is the stage where the auditor develops the objectives and steps of the audit. Research is required in order to do adequate planning. The auditor should research into why the audit it being scheduled, which may include interviews with the…[Read more]