-
Joelle S. Quiapo commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 2014 Spring – Data Analytics for IT Auditors 10 years, 8 months ago
I received this message:
You attempted to access the “Data Analytics for IT Auditors” dashboard, but you do not currently have privileges on this site. If you believe you should be able to access the “Data […]
-
Joelle S. Quiapo commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 2014 Spring – Data Analytics for IT Auditors 10 years, 8 months ago
Per the reading definition / explanation and the provided INFOGINEERING Model on the difference between “KNOWLEDGE” and stored / captured “INFORMATION”, an example of something I “KNOW” is that the promotion board […]
-
Joelle S. Quiapo commented on the post, Individual Assignment – 1 (Due 9/16), on the site System & Infrastructure Lifecycle Management 1 11 years, 1 month ago
We can email to you anytime on Monday, just before the start of class?
-
Joelle S. Quiapo commented on the post, Number 2 Pencils for Exam, on the site Protection of Information Assets 11 years, 5 months ago
Will do, thanks! See everyone at 1730 tomorrow =)
-
Joelle S. Quiapo commented on the post, Quiz Solutions, on the site Protection of Information Assets 11 years, 5 months ago
THANK YOU!!!!!!!
-
Joelle S. Quiapo commented on the post, Week 14 Materials, on the site Protection of Information Assets 11 years, 6 months ago
I found this article on America developing doctrines for Cyber-warfare.
“The […]
-
Joelle S. Quiapo commented on the post, Room change for Apr 30 session – Speakman 200, on the site Protection of Information Assets 11 years, 6 months ago
Will do, thanks.
-
Joelle S. Quiapo commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
Related article for the week.
http://www.micklerandassociates.com/instant-messaging-security-risks/
This article is on Instant Messaging and the Security Risks.
Practical safeguards to exercise:1. […]
-
Joelle S. Quiapo commented on the post, Malware Inforgraphic, on the site Protection of Information Assets 11 years, 6 months ago
Yes I agree. I’m much better with pictures and bright colors~!
-
Joelle S. Quiapo commented on the post, Thousands of compromised Apache servers direct users to malware, on the site Protection of Information Assets 11 years, 6 months ago
This statement is disconcerting…
“another great problem for the researchers is that they can’t figure out how the attackers gain access and control over the servers in order to deploy the malicious module” but […] -
Joelle S. Quiapo commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 6 months ago
Per the Vacca reading, I found the the “application of encryption” portion interesting and found this .pdf document that addresses “Selective Encryption for Consumer […]
-
Joelle S. Quiapo commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 6 months ago
My related article for the week coincides with what I read in Chapter 33 regarding an attack that encrypts data and extorts in exchange for decrypting the data. […]
-
Joelle S. Quiapo commented on the post, Class assignment for 16 April – Attend Fox Information Technology Awards, on the site Protection of Information Assets 11 years, 6 months ago
Will comply Prof Senko.
I registered yesterday. -
Joelle S. Quiapo commented on the post, How to become a Password cracker, on the site Protection of Information Assets 11 years, 7 months ago
I didn’t think it was simple at all. I lost track of what he was talking about mid way.
He did a great job at making it “sound” simple though. I’m sure this takes some level of intelligence…and defintiely some patience. -
Joelle S. Quiapo commented on the post, Week 10 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Per the Vacca reading, I found the chapter on Identity Theft the easiest to comment on.
The last paragraph on third party administration’s suggestion regarding correction of incidents equating to high […] -
Joelle S. Quiapo commented on the post, Week 10 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Here is my related article on Child Identity Theft.
http://www.transunion.com/personal-credit/credit-disputes/fraud-victim-resources/child-identity-theft.pageAlthough I never dreamed of this, apparently this […]
-
Joelle S. Quiapo commented on the post, Week 10 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Here is my related article on Child Identity Theft.
http://www.transunion.com/personal-credit/credit-disputes/fraud-victim-resources/child-identity-theft.pageAlthough I never dreamed of this, apparently this […]
-
Joelle S. Quiapo commented on the post, Week 9 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Per the Vacca reading, chapter 4, this is the first time I’ve heard of the term “Dictionary attack.”
Per Wikipedia, a dictionary attack uses a targeted technique of successively trying all the words in an […] -
Joelle S. Quiapo commented on the post, Week 9 Materials, on the site Protection of Information Assets 11 years, 7 months ago
http://udini.proquest.com/read/doc:5150b377e1d9e50511e15437/
http://www.nwfusion.com, DocFinder: 6329This related article is on Network Security at Universities.
Per an Emory University survey including 13 major […] -
Joelle S. Quiapo commented on the post, Update on HDFC, on the site Protection of Information Assets 11 years, 7 months ago
Looks like HDFC went with cloud computing (private database cloud service) based on Oracle Database and Oracle Enterprise Manager 12c as per feedback received from “both [their] internal customers and in-house […]
- Load More