-
Joelle S. Quiapo commented on the post, Week 5 Materials Posted , on the site Protection of Information Assets 11 years, 8 months ago
Here is an article on the PATRIOT Act.
http://topics.nytimes.com/top/reference/timestopics/subjects/u/usa_patriot_act/index.htmlDo you believe the […]
-
Joelle S. Quiapo commented on the post, Week 5 Materials Posted , on the site Protection of Information Assets 11 years, 8 months ago
I’m trying to find the SANS reading assignments 1 and 2.
These are the links I found….are these […] -
Joelle S. Quiapo commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site Protection of Information Assets 11 years, 8 months ago
http://defensesystems.com/articles/2011/08/08/cover-story-2011-network-integration-evaluation.aspx
“New technologies are often developed and rushed into the field, where deployed troops have to make do with […]
-
Joelle S. Quiapo commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site Protection of Information Assets 11 years, 8 months ago
Oh wow!
The article also mentioned that “users should have passwords that cannot be easily guessed”…does this suppose that the President’s password was known and used? Could be an insider attack or possible […] -
Joelle S. Quiapo commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site Protection of Information Assets 11 years, 8 months ago
Thanks Prof Senko.
Something to look forward to in 13 years…(for me). -
Joelle S. Quiapo commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site Protection of Information Assets 11 years, 8 months ago
Qiaozi,
I would just ask your friend about the event (personally).
No need to physically thank FB, just be cautious. This is interesting and good to know that FB has an automatically generated response to “abusive” links. -
Joelle S. Quiapo commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site Protection of Information Assets 11 years, 8 months ago
Per the Vacca reading, I found the Threat Process to be truly indicative of the “unknown, potential, and preventative” measures that Security Managers are up against.
“Threat agents are threats only when they […] -
Joelle S. Quiapo commented on the post, Week 3 Materials Posted, on the site Protection of Information Assets 11 years, 8 months ago
Not sure what my impression of him is…pursuasive, informative…?
-
Joelle S. Quiapo commented on the post, Week 3 Materials Posted, on the site Protection of Information Assets 11 years, 8 months ago
Oh wow….thanks Nelson.
-
Joelle S. Quiapo commented on the post, ISO 27001 – assignment 1, on the site Protection of Information Assets 11 years, 8 months ago
Thanks Prof. Senko!
I needed the link.
-
Joelle S. Quiapo commented on the post, Week 3 Materials Posted, on the site Protection of Information Assets 11 years, 9 months ago
Prof Senko,
When you posted the following comment “I will post the class materials over the weekend …” does this pertain to our Assignment 1 ISO 27001?Thanks =)
-
Joelle S. Quiapo commented on the post, Week 3 Materials Posted, on the site Protection of Information Assets 11 years, 9 months ago
http://www.csoonline.com/article/651490/social-engineering-attacks-highlights-from-2010
Here is a short blog/article about a contest that was designed to raise awareness about social engineering.
Results of […] -
Joelle S. Quiapo commented on the post, Week 3 Materials Posted, on the site Protection of Information Assets 11 years, 9 months ago
Nelson,
What are “ZYNGA RANK POINTS’? -
Joelle S. Quiapo commented on the post, Phishing/Trojan Example, on the site Protection of Information Assets 11 years, 9 months ago
I notice the email was sent to a number of “spamarrest” accounts as well.
-
Joelle S. Quiapo commented on the post, Phishing/Trojan Example, on the site Protection of Information Assets 11 years, 9 months ago
Prof Senko,
That is a pretty sophisticated/legitimate phishing attempt and required a double reading/review on my part. What would you say, if any, gave this phishing attempt away? The sender email address perhaps? -
Joelle S. Quiapo commented on the post, Week 2 Materials Posted, on the site Protection of Information Assets 11 years, 9 months ago
Risk IT framework:
Risk IT framework:
Question for the class:
All of the 42 pages of reading (I enjoyed the pages left blank—as a break on my eyes) appears to be common sense and smart / best practices for a […] -
Joelle S. Quiapo commented on the post, Updates Syllabus Posted, on the site Protection of Information Assets 11 years, 9 months ago
Thank you Prof Senko!
-
Joelle S. Quiapo commented on the post, Week 2 Materials Posted, on the site Protection of Information Assets 11 years, 9 months ago
Here is my post regarding the reading.
I did not know that the internet was originally designed for military applications.
I also learned that our USB ports (which I referred to in my previous post; […] -
Joelle S. Quiapo commented on the post, Week 2 Materials Posted, on the site Protection of Information Assets 11 years, 9 months ago
http://gcn.com/articles/2010/02/18/dod-lifts-usb-drive-ban.aspx
Here is an article addressing the DoD’s lift of the ban on USB Drives.
I remember my first time in Iraq as a 2LT labeling each thumb drive with […]
-
Joelle S. Quiapo commented on the post, Week 2 Materials Posted, on the site Protection of Information Assets 11 years, 9 months ago
Awesome Andrew and thanks for sharing.
I heard about this on the news this morning. - Load More