-
Fred Zajac posted a new activity comment 8 years, 1 month ago
The discussion made me do a little research and I found this link to the history of Operating systems. Many of us only know about the last 20 years, but the first OS was created in 1950. Most computers were too expensive until the 70’s, when the PC & MS DOS took off but even then, they were a luxury for most families and was only a command line…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
Prof. Yao,
I do believe mainframes are more secure for the reasons above and…
They are usually in a secure environment. Data Center or Co-location, with extremely high amount of physical controls. This would prevent access, reduce natural disaster issues, and power outages.
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
Even with a top notch policy plan, there may be some control issues that arise and every organization should have a remediation plan to reduce the down-time associated with the failure. Here are a few I have experienced.
1. Accidental – This would be the failure of equipment or untrained users. An example would be an old operating system, f…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
The Operating system is the link between the User and Computer. It provides, now graphical user interfaces to the underlying hardware, and allows the user to execute software away from the command line. Examples of operating systems are: Windows, Linux, and iOS. The operating system is used to allow the user to input commands, via and I/O…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
Tesla model S was hacked by a Chinese security research group (Keen Security) who posted the entire hack and how they did it on YouTube. The group was able to take over the controls of the cars computer, door locks, side mirrors during auto pilot mode. Tesla has provided patches for the security flaw.
This is a huge security flaw for Tesla…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
Priya & Vaibhav,
The decision to move functions to the cloud, or to outsource is a difficult decision to make. The two main factors I see in this decision are:
1. Control – Do you want to have the ability to control the environment? Make changes, add & remove controls, ect. I see difference between a companies cloud solution vs. on-site…[Read more] -
Fred Zajac posted a new activity comment 8 years, 1 month ago
Mengxue,
I like how you mention “Harmonization”. This reminds me of companies located in different states and have different taxing procedures with goods / services.
Here is an example:
Everyone has a cell phone and the taxes associated with the phone & service are based on individual State regulations. One person in PA will have to pay…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
One of India’s leading private banks, HDFC bank revolutionized the Public Sector Banks (PSB’s) in 1994, reducing the slow and time consuming process of depositing and withdrawing funds by implementing 24/7 self-service technologies. The implementation of customer convenient technologies posed significant challenges to the availability, sec…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
What key (1-2) competencies does the person responsible in a company for the Order to Cash (OTC) need to have? Why?
Each responsible party should have a passion to achieve the organizations mission statement and accomplish / exceed the company’s goals. They have to believe in what the company is doing, why they are doing it, and how they a…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
Who in a company should be responsible for the controls of that company’s Order to Cash (OTC) Process? Why?
I believe the C-level executives (CFO, COO, & CIO) should create the controls for the company’s OTC process. The control framework should be a joint operation to accurately identify the risks, and allocate the appropriate resources to…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
Which portion of the Order to Cash (OTC) process do they see as the most vulnerable to theft, fraud or failure of some kind? Explain.
The portion of OTC process I see most vulnerable to theft, fraud or failure is the sales process. I believe the sales process is most vulnerable because it has “Many Flavors” to sneak a taste. Here are a few…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
As customers we experience various company’s order to cash process (OTC) whenever we buy something. Which company do you believe has a ‘great’ OTC process? Why?
I purchased two new mattresses, one for myself and one for my son. The OTC process we received seemed to work ‘great’. My family was very pleased with the entire OTC process.…[Read more]
-
Fred Zajac commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
One example of Normalization is the class webpage. The page allows both Prof. Yao and the students access to data in an organized fashion. It allows for a reduction in redundancy, and puts the data in one central bucket.
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
I thought I posted the link to my story. It is an interview on NPR, speaking about the athletes and other United States figures being hacked by Russian lead groups.
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
List risks associated with database management systems (DBMS)
1. Configuring or setting security controls on users – This give the user access to otherwise restricted data and/or granting administrator privileges to move, add, or change data.
2. Securing the system from hackers – Malware may be installed on the server, granting access to the…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
Key benefits of relational databases vs traditional file system?
1. Data Independence – This allows for the data structure, in a database management system to be changed without changing the other fields. An example of this is data mapping for program customization. You may want to change a phone number with a separate field for the area c…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
What are key characters of relational database management systems?
1. Data Storage – Data is organized and stored in tables (Columns & Rows).
2. Rules – Can set up thresholds to limit the data input and/or access
3. Triggers – Allows for a reaction from an initial action.
4. Storage – program specific procedures to store data (Saved or Upda…[Read more] -
Fred Zajac posted a new activity comment 8 years, 1 month ago
Laly,
Getting greased means someone is paying off another person for a contract. Politicians getting “greased” by developers is an example.
Here is how it benefited the purchasing manager.
The purchasing manager would be assigned a budget by the CFO. Most of the time, budgets stay static unless there is a disruption in the business.…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
Alex,
One issue with Android phones, and google software is that it is “Open Source”. Which means the code is made public and can be modified by anyone. This means, a person can create a “flashlight” app for the android and hide malicious code within the application and you would never know.
This is why Apple is so successful at security…[Read more]
-
Fred Zajac posted a new activity comment 8 years, 1 month ago
I would go about creating the information risk profile by conducting interviews with owners / employees to understand:
1. What the business does
2. How it sustains a competitive advantage
3. Resources utilized to sustain the competitive advantage
4. What would happen if one or all of the resources were compromised?The information gathering…[Read more]
- Load More