-
Deepali Kochhar commented on the post, Week 6 Questions, on the site 8 years, 1 month ago
Just to add to your privacy point Brou, VPN also first encrypts the data before sending it to the network thus reducing the chances of data breach to minimum. This helps in maintaining the confidentiality and integrity of data.
-
Deepali Kochhar commented on the post, Week 6 Questions, on the site 8 years, 1 month ago
A good point made here. VPN helps in reducing the cost for the organisation. The Accenture case which we read mentioned the same point. Accenture established a global delivery network giving its employees a facility to work remotely and hence reducing the IT cost per person by 69% which is a big number.
In this way VPN has definitely proved its…[Read more] -
Deepali Kochhar commented on the post, Week 6 Questions, on the site 8 years, 1 month ago
Definitely Priya. VPN slows down the speed. It is still not a choice for the developers to do programming through VPN. Sending files and working on some data on local server is done well but for managing database and programming it is still not a choice unless and until there is an urgent need.
-
Deepali Kochhar commented on the post, Week 6 Questions, on the site 8 years, 1 month ago
To add to your point Priya, It provides secure data transmission through the virtual network by encrypting and sending it.
-
Deepali Kochhar commented on the post, Week 5 Questions, on the site 8 years, 1 month ago
Good point Wenlin. It is important to maintain the uniqueness and accountability of every system. This can only be possible by putting in proper segregation of duties and if it doesn’t justify the cost we can use compensating controls to manage it.
-
Deepali Kochhar commented on the post, Week 5 Questions, on the site 8 years, 1 month ago
Great point Mansi. In my organisation we had a scanner installed at the entry to check personal electronic devices such as hard drives, pen drives etc so that no data breach can occur. Metal detector can work in the way for a car making(manufacturing) firm. This will help in stopping such kind of theft to a great extent.
-
Deepali Kochhar posted a new activity comment 8 years, 1 month ago
Brou,
Don’t you think getting inventory check with people who are not doing it regularly can again be a reason for mistakes. Rather we can set up an isolated inventory check department who are not a part of any work force in the organisation. This will help in a better way to maintain the integrity.
-
Deepali Kochhar commented on the post, Week 5 Questions, on the site 8 years, 1 month ago
Great point on scrap inventory Paul. I recently read a news that companies are now working on following such controls. Some of the items which remain unsold and are about to reach the “best before” dates will be tracked. All such items will then be sold for free. This will avoid the waste of product and people in need will be able to use it as…[Read more]
-
Deepali Kochhar commented on the post, Week 5 Questions, on the site 8 years, 1 month ago
Great point Magaly. Defining the return on investment is very important. Sometimes such frauds occur due to this reason only that the cost needed to put in security controls doesn’t justify the cost the of product.
-
Deepali Kochhar commented on the post, Week 5 Questions, on the site 8 years, 1 month ago
Rightly said Priya. Satisfaction of employees is achieved by setting up good organisation policies and procedures.
Every employee must me made accountable for the work they are doing and should motivate by given incentives, appreciations, promotions for their good efforts and at the same time they must be trained to follow the policies so that…[Read more] -
Deepali Kochhar posted a new activity comment 8 years, 1 month ago
What is OSI model? What’s the main function of each OSI layer?
OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. It allows vendors and developers to manage interoperability of the digital communication products and software programs they create.
It has 7 layers:
Physical layer: T…[Read more]
-
Deepali Kochhar posted a new activity comment 8 years, 1 month ago
2. What are the advantages of VPN?
Virtual Private Network, or VPN, is a group of computers (or discrete networks) networked together over a public network—namely, the internet. The following are the advantages of VPN:
• Create private scope of computer communication
• Helps in remote connection to data centers
• Secure data transmi…[Read more] -
Deepali Kochhar posted a new activity comment 8 years, 1 month ago
Q 2. Assume the ‘One Piece at a Time’ video scenario could happen. If you are the operations manager responsible for the assembly line, what 1-2 key controls would you implement? Explain how the control addresses the risk.
If I am the operations manager responsible for the assembly line, I would establish following controls:
A. I wil…[Read more]
-
Deepali Kochhar posted a new activity comment 8 years, 1 month ago
Q1. Using the Fraud Triangle analyze the ‘One Piece at a Time’ video scenario and explain how the environment was favorable to Fraud.
The scenario in ‘One Piece at a time’ is about an autoworker on the Cadillac Assembly line.
In terms of fraud triangle, it can be explained based on three points:
A. Fraud opportunity: Mr. Johnny Cash wa…[Read more]
-
Deepali Kochhar posted a new activity comment 8 years, 1 month ago
New MarsJoke Ransom-ware Targets Government Agencies
State and local government agencies, K-12 educational institutions, healthcare, telecommunications, insurance are being targeted in a newly discovered spam email campaign aimed at distributing a new ransomware variant.
The MarsJoke ransom-ware email campaign featured emails containing links…[Read more] -
Deepali Kochhar posted a new activity comment 8 years, 1 month ago
Professor,
In my view, Mainframe is more secure due to following reasons:
1. Mainframes have centralized management and auditing features.
2. No monthly security patches are to be tested and rolled out.
3. Viruses, are almost unheard of on mainframe computers because their architecture makes it virtually impossible for…[Read more]
-
Deepali Kochhar commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
Rightly said Priya. We can also used personalized antivirus as using the windows antivirus is also not that much secure. Using personalized antivirus will add another layer of security to the system.
Another way to prevent DOS is applying reverse proxy, rather a collection of reverse proxies spread across multiple hosting location. By deploying…[Read more]
-
Deepali Kochhar posted a new activity comment 8 years, 1 month ago
3. What are the challenges faced by Salvi?
The challenges faced by Salvi are:
• It was Salvi’s principal mandate to make certain that HDFC Bank’s online banking platform was secure from online hazards
• The two components of the online banking: Net banking and mobile banking, Mobile banking was a new concept in India and people were not tha…[Read more] -
Deepali Kochhar posted a new activity comment 8 years, 1 month ago
Great point Said. It is very important to protect the communication between application and hardware. One of the example can be remote access(VPN). It is most vulnerable if not protected by a strong password to ensure safety. Also they can use SSL for outlook during the remote access. Network access control(NAC) systems should be well configured.…[Read more]
-
Deepali Kochhar commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
Rightly said Joshua. Computer functions along with the data-sets that resides on the Operating system become vulnerable to security breach if operating system is not properly protected. A properly protected OS ensures the availability, confidentiality and integrity of the data sets residing on it.
- Load More