-
Ian M. Johnson posted a new activity comment 8 years ago
The article I read was about how the FBI has discovered that hackers are trying to hack voter registration sites in 12 or more states. This time, FBI investigators believe that it is Russia behind the attacks. The FBI director, James Comey, said that there have been a number of scanning activities which is a step that leads to potential…[Read more]
-
Ian M. Johnson posted a new activity comment 8 years ago
Laly – Great advantages answer. I think a lot of your advantages depend on that proper planning that is needed in order to take the proper precautions that result in strong security.
Another disadvantage of a VPN is that VPN requires experienced employees that have knowledge with public networks security, password and data encryption, network…[Read more]
-
Ian M. Johnson posted a new activity comment 8 years ago
What are the advantages of VPN:
The advantages depend on what you use VPN for. Most businesses use VPN for: allowing remote workers (which saves the company money), branch offices, partners, and distributors. Today, some businesses use VPN to form a single secure private network by connecting different cloud providers.
-
Ian M. Johnson commented on the post, Week 6 Questions, on the site 8 years ago
-
Ian M. Johnson posted a new activity comment 8 years ago
According to TechTarget.com, the OSI model is: is “a reference model for how applications can communicate over a network. A reference model is a conceptual framework for understanding relationships. The purpose of the OSI reference model is to guide vendors and developers so the digital communication products and software programs they create w…[Read more]
-
Ian M. Johnson posted a new activity comment 8 years ago
Fred – Although I believe control and cost are factors I do not think they are the main factors.
I think all of these decision will be based on the bank’s core activities (providing and facilitating financial services) and how they can provide these services in the best way possible that will allow for annual increases in new customer accounts w…[Read more] -
Ian M. Johnson posted a new activity comment 8 years ago
This is interesting. This just reminds me how crazy security will have to be if they release the self-driving cars. Self-driving cars are zero room for error. A great/expensive product like a Tesla makes it seems like this may never happen. I am curious to how well the patches will fix the security flaws with Tesla. I wonder what the hacker…[Read more]
-
Ian M. Johnson commented on the post, Week 4 & 5 Questions, on the site 8 years ago
Abhay – For my company, yes. It is one of my biggest compalints about my job. I have so many passwords for signing on to many different things. It is very difficult to remember and keep track of. I asked the question to my boss about why and he said the amount of money risked is greater than the cost savings amount that would be saved with…[Read more]
-
Ian M. Johnson posted a new activity comment 8 years ago
Laly,
After you did this, I decided to compare Windows to Linux. Below are some interesting things I found out:
Windows has a fairly straightforward version structure, Linux is much more complex. It is common for people to customize Linux because it is open source so it is difficult to pick which Linux distro you want and easier to pick…[Read more]
-
Ian M. Johnson posted a new activity comment 8 years ago
Said – you’re right. Wouldn’t make sense/isn’t very valuable or useful without the OS.
-
Ian M. Johnson commented on the post, Week 4 & 5 Questions, on the site 8 years ago
Laly – Analogies can help explain and remember things in the IT world. A professor helped me remember by saying: An operating system is like a manager because its role is to make sure that all of the programs on the computer are doing their job. So, Linux and Windows are just like different managers. They do the same thing, but have different…[Read more]
-
Ian M. Johnson commented on the post, Week 4 & 5 Questions, on the site 8 years ago
Yang, what would be a good example of an admin policy here? Do you think instructions and education exercises to ensure, for example, proper user usage? I could see the helping security.. Could also serve the purpose of interpreting the requirements of the system and how employees or user could affect the system in negative ways if they do not…[Read more]
-
Ian M. Johnson posted a new activity comment 8 years ago
Vishal Salvi, Chief Information Security Officer of HDFC Bank, has the challenge to make several very tough decisions, which include: how does he ensure the security of an online transaction while still keeping customer convenience as a priority, should he make secure access mandatory or should he leave it discretionary, and should he go for an…[Read more]
-
Ian M. Johnson posted a new activity comment 8 years ago
The article I read is about how mobile devices and mobile security is likely to become the next corporate focus for security executives because in recent times, hacks and exploits have become more successful. In fact, it is now a fact that mobile security NEEDS to be part of the broader policy and procedure mix because most incidents are due to…[Read more]
-
Ian M. Johnson posted a new activity comment 8 years ago
List common control issues associated with operating systems and remediation strategy/plan.
The OS must protect itself from security breaches, such as runaway processes ( denial of service ), memory-access violations, stack overflow violations, the launching of programs with excessive privileges, and many other like Breach of Confidentiality,…[Read more]
-
Ian M. Johnson commented on the post, Week 4 & 5 Questions, on the site 8 years ago
^^^^ Why is so important to protect operating systems?
-
Ian M. Johnson posted a new activity comment 8 years ago
The operating system is the primary level of software that allows your computer to accomplish beneficial work. The operating system and its roles are key to making informed decisions about your computer. It manages the computer’s memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer…[Read more]
-
Ian M. Johnson posted a new activity comment 8 years ago
Wow that is scary. I am sure that this is life or death for drone companies. I would imagine they would stop producing drones if drone companies can not up their cyber security game. Too risky to put human’s lives in danger if hacking into a drone is that easy.
-
Ian M. Johnson posted a new activity comment 8 years ago
Ming, Great Answer. I have heard it referred to Risk Appetite as well. I think a company’s Risk Appetite is also affected by Company Culture. Some company’s are by design riskier than others and vice versa. That is because many companies survive off taking risks because it is the nature of their business. For example, Life Insurance companies…[Read more]
-
Ian M. Johnson posted a new activity comment 8 years ago
Key benefits/advantages brought by relational databases
• Flexible and engrained, established with quality standardized products in the IT industry.
• Uses SQL (Standard data access language) which is a well know language in the industry.
• Large development efforts and with large databases are well understood.
• Risks and costs are known t…[Read more] - Load More