-
Joelle S. Quiapo commented on the post, Testing Data Center Power Systems, on the site Protection of Information Assets 11 years, 7 months ago
What was it that was pushed to set off the alarm? Was that a test of their UPS?
-
Joelle S. Quiapo commented on the post, Weekly Question #7: Complete by March 27, 2017, on the site Protection of Information Assets 11 years, 7 months ago
Vacca reading on the Final Report of the National Commission of Terrorist regarding “Imagination” and FAA / NORAD training seems to hint of complacency. This is also evident in the “Management” paragraph […]
-
Joelle S. Quiapo commented on the post, Week 8 Materials, on the site Protection of Information Assets 11 years, 7 months ago
ISACA Assignment 1 talks about how technology drives and encourages new sources for competitive advantage but how it is also what creates new expectations and inherent vulnerabilities.
The greatest risk is […] -
Joelle S. Quiapo commented on the post, Week 8 Materials, on the site Protection of Information Assets 11 years, 7 months ago
-
Joelle S. Quiapo commented on the post, Degradation Temperature of Magnetic Storage, on the site Protection of Information Assets 11 years, 7 months ago
Try going to Iraq or Kuwait in JULY….feels like your skin is melting off and your eyes are on fire.
-
Joelle S. Quiapo commented on the post, Vacca reading is actually Chapter 36 – Physical Security, on the site Protection of Information Assets 11 years, 7 months ago
Regarding the Cybercriminals article, besides using a proxy auto-configuration file to configure browsers, how else can one tell if a shadow internet is accessed? This is creepy.
-
Joelle S. Quiapo commented on the post, Vacca reading is actually Chapter 36 – Physical Security, on the site Protection of Information Assets 11 years, 7 months ago
I thought CHAP 36 was what we needed to read for last week and what we discussed in class? I’m tracking that we need to comment on CHAP 38 before MAR 19?
-
Joelle S. Quiapo commented on the post, Phishing Example – American Express Password Reset, on the site Protection of Information Assets 11 years, 7 months ago
Would this qualify as a sophisticated phishing attempt considering there are only three highlighted portions?
-
Joelle S. Quiapo commented on the post, Week 7 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Per the Vacca reading, I can relate to the section on CHUID and FIPS 201-1 (PIV of Federal Employees and Contractors) the most. In the Army, we use three-factor authentication.
The “smart card” is our Military […] -
Joelle S. Quiapo commented on the post, Week 7 Materials, on the site Protection of Information Assets 11 years, 7 months ago
http://udini.proquest.com/preview/big-data-big-security-goid:1030264220/
Here is an article titled, “Big Data, Big Security” reference Heartland Payment Systems, TJX, Epsilon and Sony.
Heartland Payment […] -
Joelle S. Quiapo commented on the post, Week 7 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Per the SANS reading on A Lord of the Rings, “rings” being a component of IT security and physical security being one of the most important rings, I found the example on the company custodian extremely […]
-
Joelle S. Quiapo commented on the post, FAX-related Phishing Example, on the site Protection of Information Assets 11 years, 7 months ago
This would be easy to ignore if I did not associate or conduct business with eFax. If I did, however….I could see how this could be a successful attack.
-
Joelle S. Quiapo commented on the post, Bank's partial passwords are easy to guess, on the site Protection of Information Assets 11 years, 7 months ago
In my 8 years of experience, I have deducted that Soldiers between the age of 18-24 as well as Department of the Army civilians who are new to the field, have loosely secured their passwords or have easy to guess […]
-
Joelle S. Quiapo commented on the post, Example: User Education about Phishing at Temple, on the site Protection of Information Assets 11 years, 7 months ago
Jeff,
Per your comment on this being the first in 5 years, what do you attribute this to be a result of? -
Joelle S. Quiapo commented on the post, Week 6 Materials Posted, on the site Protection of Information Assets 11 years, 8 months ago
Interesting… famous for his crime. I’m sure he made a killing in book sales.
The audience laughed and the government essentially converted a “bad guy” into a “good guy” who now gets paid to hack? Or I wonder if […] -
Joelle S. Quiapo commented on the post, Example: User Education about Phishing at Temple, on the site Protection of Information Assets 11 years, 8 months ago
So the recommendation to go directly to educause’ website came after the initial email (with link) from educause? Good practice but I wonder how many already accessed the link prior to Computer Services’ email?
-
Joelle S. Quiapo commented on the post, Week 6 Materials Posted, on the site Protection of Information Assets 11 years, 8 months ago
http://www.pcworld.com/article/259548/hacker_arrested_for_2008_ddos_attacks_on_amazon_com.html
See attached related link regarding a DoS attack on Amazon.
I found this line to be the most annoying, “Zubakha […] -
Joelle S. Quiapo commented on the post, Week 6 Materials Posted, on the site Protection of Information Assets 11 years, 8 months ago
Per the HBR Article, “prevention requires a lot of nagging…[and] you know you’ve succeeded only when nothing happens.” These are my sentiments exactly. […]
-
Joelle S. Quiapo commented on the post, Social media disaster for Burger King: Twitter feed says chain sold to McDonald's, on the site Protection of Information Assets 11 years, 8 months ago
That was nice of McDonalds to repond.
-
Joelle S. Quiapo commented on the post, Spoofing Example, on the site Protection of Information Assets 11 years, 8 months ago
Really? This looks legit!!
- Load More