-
Leandro H Cinti commented on the post, Integrating the Internet of Things, on the site 10 years, 1 month ago
Readings – Key point:
Risk assessment is the foundation of the security management system which could be deployed using a standard such as ISO27000. After identifying and assessing risks, they must be treated some way: modified, shared, avoided, or retained.
Question:
When a “zero risk” scenario is possible ? What does it mean from the…[Read more]
-
Leandro H Cinti commented on the post, Progress Report for Week Ending, September 22, on the site 10 years, 1 month ago
Week 4 – Reading and article:
Key point
Periodic vulnerability scanning helps discover weaknesses that would likely be exploited by hackers. However, a single tool, like Nessus, can not replace the information security professional knowledge and experience about security strategy and configuration.
Question for the class
What types of…[Read more]
-
Leandro H Cinti commented on the post, Week 4 Materials Posted, on the site 10 years, 1 month ago
Sorry, disregard the previous link. This is the correct one: http://www.net-security.org/secworld.php?id=17358
-
Leandro H Cinti commented on the post, Week 4 Materials Posted, on the site 10 years, 1 month ago
75% of mobile apps will fail basic security tests
This week I’m sharing with all of you an article on security in mobile applications.
Through 2015, more than 75 percent of mobile applications will fail basic security tests, according to Gartner.
Enterprises that embrace mobile computing and BYOD strategies are vulnerable to security…[Read more]
-
Leandro H Cinti commented on the post, Week 3 Materials Posted, on the site 10 years, 1 month ago
Readings – Key point:
Local Area Networks have become increasingly important as the number of online users grow and companies expose their services on the Internet. The architecture design of a LAN based on firewalls, IDS/IPSs and security techniques (i.e. ISO 27001) is key to protect the enterprise assets.
-
Leandro H Cinti changed their profile picture 10 years, 1 month ago
-
Leandro H Cinti commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 10 years, 1 month ago
Homeland Security contractor suffers computer breach.
According to this article, the systems of a government contractor (USIS) that has been conducting background security checks on Department of Homeland Security personnel suffered an attack recently.
The security breach may have affected the internal files of as many as 25,000 of the…[Read more]
-
Leandro H Cinti commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 10 years, 1 month ago
Readings key point:
Building a secure infrastructure might be inconvenient because it can affect functionality and productivity. Info sec should be seen as a process. Security hardware and software are only tools that help secure systems but cannot guarantee full protection to company assets.
-
Leandro H Cinti commented on the post, Progress Report for Week Ending, September 22, on the site 10 years, 1 month ago
For second week I’m sharing with you an interesting Forbes bulletin that comments on security incidents that recently impacted on UPS, PlayStation Network and JPMorgan Chase among others.
On the one hand, 70% of South Korea’s population between the ages of 15 and 65 may have had their personal information stolen in a data breach. The hackers t…[Read more]
-
Leandro H Cinti changed their profile picture 10 years, 1 month ago