-
Oby Okereke changed their profile picture 5 years, 9 months ago
-
Oby Okereke wrote a new post on the site MIS5208 Spring 2018 6 years, 7 months ago
By Sarah Q. Wirskye – On February 6, 2018
Healthcare fraud is a government priority. While there are variations depending on the industry, the government generally focuses on the same basic conduct in […]
-
Oby Okereke's profile was updated 6 years, 8 months ago
-
Oby Okereke wrote a new post on the site MIS5208 Spring 2018 6 years, 8 months ago
Mobile devices are ubiquitous. Most people have conducted business transactions of varied types via smartphones. Mobile devices have changed the way we do business with regard to e-commerce and consumers’ a […]
-
Oby Okereke commented on the post, Discussion Week 14, on the site 6 years, 11 months ago
4.3: Discussion Topic 3:
Every profession maintains a code of conduct for its members and security consulting is not left behind. Based on the scenario, any action short of presenting my findings as obtained will reek of impropriety. As a security consultant, I must strive to avoid any improprieties or the appearance of improprieties nothing…[Read more]
-
Oby Okereke commented on the post, Discussion Week 6, on the site 6 years, 11 months ago
Based on my research,Quantum cryptography will definitely change the way computers work. Though much of its use is in theoretical state, much progress has been made lately. Take for instance Bitcoin. Some Bitcoin miners are already taking advantage of quantum computing to mine coins at a faster pace to their advantage. As quantum cryptography…[Read more]
-
Oby Okereke commented on the post, Discussion Week 6, on the site 6 years, 11 months ago
Based on my research on Quantum cryptography, will definitely change the way computers work. Though much of its use is in theoretical state, much progress has been made lately. Take for instance Bitcoin. Some Bitcoin miners are already taking the advantage of quantum computing to mine coins to their advantage. As quantum cryptography grows and…[Read more]
-
Oby Okereke commented on the post, Discussion Week 2, on the site 6 years, 11 months ago
One major security concern with single sign-on is single point of failure. The opportunity gain of reducing multiplicity of efforts may turn out to be a risk because if a users password is exposed or obtained by an unauthorized user, a lot of damage can be done. Undoubtedly, single sign on makes user access to multiple systems and applications in…[Read more]
-
Oby Okereke commented on the post, Discussion Week 14, on the site 6 years, 11 months ago
D14.2: Discussion Topic 2:
I would consider the RFC 1087: Ethics and the Internet still relevant. In my opinion, it forms the building block of all things internet today. The five basic ethical principles forms the pillar of most policies and rules governing the use and access of data that traverses the internet. Most internet users will…[Read more]
-
Oby Okereke commented on the post, Discussion Week 14, on the site 6 years, 11 months ago
D14.1: Discussion Topic 1:
I totally agree with Jason’s viewpoint . The need for security awareness training remains inherently important if healthcare providers are to handle patients’ sensitive data as required by HIPAA regulations. Non-compliance is a big security issue and It should never be justified because security and privacy risk…[Read more]
-
Oby Okereke commented on the post, Discussion Week 11, on the site 6 years, 11 months ago
Personally, I will find it rather worrisome should Non-IT employees have access to these security tools in a workplace. Security tools such as password crackers, disassemblers, packet sniffers etc., should be part of an arsenal of a Cyber-Security professional. It should be approved by Management prior to its adoption in the workplace. Overall,…[Read more]
-
Oby Okereke commented on the post, Discussion Week 9, on the site 6 years, 12 months ago
BYOD is not necessarily nightmarish with regard to HIPPA policy compliance of protecting patients data. With the use of encryption and sandboxing, I believe covered entities and healthcare providers should be able to enjoy the same level of risk protection if the same data procedures are applied on mobile devices.
-
Oby Okereke commented on the post, Discussion Week 4, on the site 7 years ago
In my experience, the option of classifying an application to a white list or black list will depend entirely on the IT environment. An organization that operates in a high risk environment may opt to white list its application which conversely relates to a trusted application. On the other hand, an organization that has a low risk profile may…[Read more]
-
Oby Okereke commented on the post, Discussion Week 3, on the site 7 years ago
I couldn’t agree with you any less. I have been having such a hard time trying to get by working with Linux but I’m glad I took this course because I have shied away from Linux in all my IT working experience and for someone like me who wants to breathe an live IT Security, the time for learning is now and I’m getting experience.
-
Oby Okereke commented on the post, Discussion Week 3, on the site 7 years ago
I am an ardent Windows platform user and have had very little exposure to Linux. My experience so far with this course has shown me that Linux offers tremendous feature that over windows. I choose Linux because it’s clearly more powerful and it certainly requires one to have adequate knowledge to work with Linux unlike Windows. This is not to…[Read more]
-
Oby Okereke's profile was updated 7 years, 1 month ago
-
Oby Okereke posted a new activity comment 7 years, 1 month ago
Hello Mohammed:
You have quite an interesting set of skills that are admirable. I hope to learn some tips with regard to firewall rules and configuration from you.