-
Liang Yao commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
There are different data leakage prevention related controls a company can implement. More to discussion in information security session.
-
Liang Yao commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
That’t exactly the reason why we need OS….
-
Liang Yao commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
And don’t forget the resilience piece…very important. In addition, how about physical access to the computers, whether servers or desktops?
-
Liang Yao commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
can patch remediate the risk caused by “zero day” attack?
-
Liang Yao posted a new activity comment 8 years, 1 month ago
Sean – how about this recent news from CBS:
“US military uses 8-inch floppy disks to coordinate nuclear force operations”
Your thoughts?
-
Liang Yao commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
That’s why it’s imperative to develop a disaster recovery plan. We will cover DR and how to audit DR plan soon.
-
Liang Yao commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
Sean, indeed, one of the very important tasks for IT auditors is to verify technology policies are adherences. In this case, what do you think a firm should do in addition to develop a malware related IT policy? Let’s discuss during the class. Thx.
-
Liang Yao commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
What cause the “blue scree of death”?
-
Liang Yao commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
A lot good points, just one correction, OS is a software, facilitate the communication between applications and computer hardware components. Itself doesn’t include hardware part.
-
Liang Yao commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
This follow up question is for ALL of you: In your opinion, which OS is easier to protect, a Mainframe computer or Distributed computer environment (e.g windows and Unix/Linux) and why?
-
Liang Yao commented on the post, Weekly Question #4: Complete by February 15, 2017, on the site 8 years, 1 month ago
Correct, one area IT auditor should always review is the IT team’s education, experience and training program.
-
Liang Yao commented on the post, Weekly Question #4: Complete by February 15, 2017, on the site 8 years, 1 month ago
Prepare to discuss controls should be in place to mitigate those risks…
-
Liang Yao commented on the post, Weekly Question #4: Complete by February 15, 2017, on the site 8 years, 1 month ago
What’s another important reason to maintaining currency of a database system?
-
Liang Yao commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Deepali – Thanks for bring in the real life example. However, the sample you brought up is rather from human aspect not a data corruption issue. We can discuss during the class.
-
Liang Yao commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Good point. We will discuss data recovery strategy in a few weeks.
-
Liang Yao commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Actually RDMS is a type of DBMS. It’s based on relationship among tables.
-
Liang Yao commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Data duplication can be reduced via a process called Normalization. We will discuss during the class.
-
Liang Yao commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
You brought up several important subjects here: authentication vs. authorization; protecting data at rest, data in use and data in transition. Those are things concern IT auditors. We will discuss on Wednesday.
-
Liang Yao commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Database Administrator (DBA) and database developer are two different roles and we will discuss during the class.
-
Liang Yao commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
RDMS has built in mechanism to handle concurrent access; it also has the security feature to assign different types of access; usually a database consists a lot of objects, including a lot of tables, access can be granted to those objects.
- Load More