-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
Anthem fined $1.7 million in 2010 breachElizabeth Weise, USATODAY4:12 p.m. EST February 5, 2015
(Photo: Michael Conroy, AP)
24CONNECT 61TWEET 3LINKEDIN 1COMMENTEMAILMORE
SAN […]
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
U.S. Datacenter Upgrades Plagued by Security Concerns
February 2, 2015 by George Leopold
As the federal bureaucracy stumbles toward datacenter modernization primarily via consolidation and a shift to the cloud, […] -
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
By Wednesday 2/4 at noon
1. Draw a diagram depicting IDS and DLP system placement in an enterprise WAN and send via email (tue90933@temple.edu)
2. Read and comment on (see details below) via email (tue90933@temple.edu)
http://www.zdnet.com/article/detection-and-prevention-6-intrusion-detection-systems-tested/
Explain (briefly) what an IDS is and how they are used
http://www.fishnetsecurity.com/6labs/blog/what-dlp-data-loss-prevention
http://www.symantec.com/data-loss-prevention/
Explain (briefly) what an DLP system is and how they are used
-
Flash zero-day flaw under attack to spread ad malware, botnet
Summary: New attacks on Flash Player may force Adobe to issue another patch just days after fixing nine flaws. -
Cyber security in 2015: What to expect
Summary: Breaches of information security and individual privacy hit the headlines regularly in 2014. But how will the arms race between cyber-attackers and defenders develop in the coming year? We analyze the experts’ predictions.
-
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
Topface Dating Website Pays Hacker Who Stole 20 Million Accounts
By Ilya Khrennikov(Bloomberg) — Russian online-dating service Topface said it paid a hacker an undisclosed sum, preventing the person from selling […] -
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
Everyone in the class should be authorized to download Visio now.
The link below provides instructions:
http://community.mis.temple.edu/technology/get-microsoft-software/ -
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
Companies often have little clue about the extent of third-party code in the enterprise or […]
-
Gregory S. Senko commented on the post, Progress Report for Week Ending, September 29, on the site 9 years, 9 months ago
Thanks Paul. I will also bring in the paper copy in case people would like to see it.
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
Presentation Details: Title: MIS 5214.001_1/22/2015 Date: Thursday, January 22, 2015 Time: 5:30 PM (UTC-05:00) Eastern Time (US & Canada) Duration: 2:30:00 Link: http://tucapture.fox.temple.edu/Mediasite/Play/0c887337b6854c0f8b0ca74ac0b08e0d1d
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
Assignment 1.
1.a Read the article (no write-up necessary):
An Introduction to DDoS – Distributed Denial of Service attack
http://www.excitingip.com/1500/an-introduction-to-ddos-distributed-denial-of-service-attack/1.b Do some web research on your own about network architectures used to protect against DDOD attacksAssignment 2:
Draw a network architecture diagram that represents a recommendation for a solution to protect against DDOS. Just represent the part of the network dedicated to that task, not the network context.Send your diagrams to me by noon on Wednesday the 28st at this email address: tue90933@temple.edu
-
Hello everyone, check out this website that let you draw professional-quality diagrams in your browser. Link: https://www.gliffy.com
-
Below you´ll find a link to a digital “on-line” attack map.
It´s a data visualization that allows users to explore historical trends in DDoS attacks, and make the connection to related news events on any given day. The data is updated daily, and historical data can be viewed for all countries.
I suggest you glance over this site, it´s very interesting !
-
Interesting histograms; thanks for sharing.
-
-
I’d rather have a D/DOS attack than have a data breach…
-
This article explain how a business owner was extorted through DDoS. His attackers wanted him to pay them to stop attacking his website. Rather than give in to the extortionist, he decided to fight back, which started a two weeks cat and mouse game with the hackers. In the end, he was able to stop the attack, but at what cost?
Was it really worth it to be out of business for two weeks, or just give in and invest in better infrastructure for the future?
http://www.csoonline.com/article/2118109/fraud-prevention/how-a-bookmaker-and-a-whiz-kid-took-on-a-ddos-based-online-extortion-attack.html -
An Enterprise Security Program and Architecture to Support Business Drivers
August 2013 by Brian RitchotThis article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. Please read
-
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
Security Architecthttp://www.builtinchicago.org/job/security-architect
posted Jan 21
Uptake Technologies
uptake.io
Chicagojob description
Location: Chicago, IL
Department: Technology
Type: Full […] -
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 9 months ago
-
Hey Guys, this is the link to the PDF copy of the book (A Patttern Language) Prof. Senko mentioned in class.
http://library.uniteddiversity.coop/Ecological_Building/A_Pattern_Language.pdf
-
Thanks Paul. I will also bring in the paper copy in case people would like to see it.
-
-
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 10 months ago
Enterprise Security Architecture: A Business-Driven Approach (Hardcover – November 12, 2005) by John Sherwood, Andrew Clark, David Lynas
I refer to this book in the syllabus as “Sherwood”
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 10 months ago
Assignment 1: Draw a security architecture diagram that represents recommendations for the technical infrastructure a 50 person consulting firm. The level of detail should be one at which you would feel […]
-
1 Key point: The section in Herrod’s article, “Where is enterprise infrastructure headed in 2015?” titled “Containers get down to work” caught my interest, opens up the possibility of using a loosely coupled standardized integration platform for segregating and plug ‘n playing software components (whether they be custom or open source) to enable controlled flexible building, improving and evolving more sophisticated software applications. As the author suggests, the “newness” of the approach in the cloud and the range of powerful competitors in this technology space, however dampers the initiative to pursue this kind of “bleeding edge” technology in earnest until it becomes more mature and a native part of a standard of a platform the enterprise is already committed to.
1 Question for my fellow classmates: Is the criteria for determining if an enterprise’s IT infrastructure should be: in a commercially supplied cloud (e.g. AWS, Microsoft Azure, etc.), internal IT servers and data center(s), or hybrid commercial cloud and internal data centers; related to the same criteria used in the software make versus buy decision?
David Lanter
tue87168
-
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 10 months ago
FIRST CLASS SESSION We will not meet in the classroom on Thursday January 15th. Instead you will watch a series of videos that will serve as an overview of the type of material will will cover during the semester. You will find the 6 videos listed below at this location: http://education.isc2.org/concentration-webcast-series/ -Access Control Systems and Methodology -Communications and Network Security -Cryptography -Security Architecture Analysis -Technology Related Business Continuity Planning and Disaster Recovery Planning -Physical Security Considerations Please let me know if you have trouble accessing the videos.
-
Here is the link to OnTheHub, which provides free/discounted software to Fox MIS students, including Microsoft Visio
-
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 10 months ago
I have re-posted the syllabus we will be using this semester on February 16 below:
-
Gregory S. Senko wrote a new post on the site Protection of Information Assets 9 years, 11 months ago
I said I would post the details of a recruiter email that I received. The company is International Capital Management headquartered in the US Virgin Islands.
BTW Be sure to re-visit the quiz solutions 🙂
My name is Karthik Reddy with Sun Technologies Inc. I am looking for a IT Auditor for my end client’s requirement.Our records show that you have past or current experience with skills fitting a current opening with our Direct End Client. Please be aware that our database has searched out your resume based on key word skills, so please accept my apologies if this requirement does not match your current or preferred job profile or location preference.I would love to show my appreciation with referral fee(s) for anyone I hire through your referral/introduction/recommendation, including confidential referrals. If you know anyone who is interested / qualified, please feel free to pass on my contact info as you see fit.****************Referral fee UPTO $1000*********Please reply with the updated resume and following details.Job Title: IT Auditor
Job Duration: Permanent Position
Job Location: Virgin Islands, USAONSITE JOB Job Description:The Information Systems Auditor offers leadership to internal audit staff on assigned information system internal reviews.
The Information Systems Auditor is responsible for the timely planning, organization, and execution of information system audits primarily in a Healthcare environment.
As a senior member of the Audit Team, they will provide assurance related to a wide range of IT infrastructures and processes while training staff auditors.
The Information Systems Auditor reports directly to the Director of Internal Audit and is responsible for effectively communicating with senior business and operations management.
As a senior member of the Internal Audit team, they offer supervisory support and direction.
They see to the evaluation, development and implementation of solutions designed to strengthen the confidentiality, integrity and availability of the client?s networks, systems and data.
Additionally, through in-depth knowledge, and mastery of the IT profession, the IS Auditor will provide guidance and support during the IT Procurement process.
Therefore, a successful candidate must possess exceptional communication skills to develop a positive working relationship with a diverse group of internal and external stakeholders across entities, business units and corporate departments.
The Information Systems Auditor must be able to manage the full audit lifecycle from planning to reporting, and ultimately issue resolution and follow-up in an eclectic audit universe.Client Expectations: Candidate must be very strong IT Auditor stronger on the IT side than Auditor side?
QualificationsBachelor?s Degree in Business or an Information Technology related discipline;
6-8 years of auditing experience with 3+ years of audit experience specific to information systems;
IT Audit experience preferably in a healthcare environment;
Candidates with 3+ years? experience in IT Purchasing/Procurement preferred;
Demonstrated ability to manage a complex workload and aggressive schedules, to prioritize and meet deadlines;
Healthcare/Medical industry or Finance information system audit experience a plus;
CISA, CISSP preferred;
Advanced Microsoft office skills;
Knowledge of TeamMate® and Audit Control Language (ACL);
Strong communication skills both written and oral.Thanks & Regards Karthik ReddyPhone – 678-203-2575karthikr@suntechnologies.comhttp://www.suntechnologies.com Sun Technologies Inc.| 3700 Mansell Road | Suite 125 | Alpharetta | GA 30022| Sun Technologies is a preferred vendor for a major telecom client on national basiswe work only with DIRECT CLIENTS for Contract Positions and Contract to Hire Positions Disclaimer: We respect your on-line privacy. This is not an unsolicited mail. Under Bill 1618 Title III passed by the 105th US Congress this mail cannot be considered Spam as long as we include contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails then please reply with a “REMOVE” in the subject line or click here to remove your name from the mailing list. I am sorry for any inconvenience.If you would like to unsubscribe, please click here.
- Load More
What are these fines used for? Are they given to the customers to find a service to monitor and better protect their personal information?