-
Paul O. Thomas commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 10 years, 6 months ago
Role which CAs play in the Public Key Infrastructure (PKI).
1. A request for a certificate is sent to the CA.
2. The CA authenticates the user, and then issues a digital certificate to the requestor.
3. The CA publishes the certificate in a public certificate store, so that the receiver of messages can authenticate the CA.
4. When the key is…[Read more] -
Paul O. Thomas commented on the post, NIST 800 60 V1R1 Guide for Mapping Types of Information and Information Systems to Security Categories, on the site 10 years, 6 months ago
Cyber security in 2015: What to expect
Summary: Breaches of information security and individual privacy hit the headlines regularly in 2014. But how will the arms race between cyber-attackers and defenders develop in the coming year? We analyze the experts’…[Read more]
-
Paul O. Thomas commented on the post, Progress Report for Week Ending, September 29, on the site 10 years, 6 months ago
Flash zero-day flaw under attack to spread ad malware, botnet
Summary: New attacks on Flash Player may force Adobe to issue another patch just days after fixing nine flaws. -
Paul O. Thomas commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 10 years, 6 months ago
An Enterprise Security Program and Architecture to Support Business Drivers
August 2013 by Brian RitchotThis article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. Please…[Read more]
-
Paul O. Thomas commented on the post, Progress Report for Week Ending, September 29, on the site 10 years, 7 months ago
Hey Guys, this is the link to the PDF copy of the book (A Patttern Language) Prof. Senko mentioned in class.
http://library.uniteddiversity.coop/Ecological_Building/A_Pattern_Language.pdf
-
Paul O. Thomas commented on the post, More details about Point-of-Sale vulnerabilities, on the site 10 years, 11 months ago
Where Did Healthcare.gov Go Wrong?
This story was first reported by the wall Street Journal. Some foreign hacker uploaded malware into a test server. The breach happened because of a series of mistakes. The news group reports that a computer server that routinely tests portions of the Web site was not set up correctly and was never supposed…[Read more] -
Paul O. Thomas commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 10 years, 11 months ago
How muck risk can or should a company allow/accept in the course of doing business?
-
Paul O. Thomas commented on the post, Progress Report for Week Ending, September 22, on the site 10 years, 11 months ago
Vacca:
The goal of any discussion with management is to convince them that in the highly technical and interconnected world we live in, having a secure network and infrastructure is a “nonnegotiable requirement of doing business”.RISK: “IT Risk” is a known business risk because it is a component of the overall risk universe of the enterprise/business.
-
Paul O. Thomas commented on the post, Progress Report for Week Ending, September 29, on the site 10 years, 11 months ago
Goodwill: 868,000 Cards Compromised
Goodwill confirmed that 330 stores were affected due to Malware from a third-party vendor used “to process credit card payments” . Please see link for full story
http://www.databreachtoday.com/goodwill-868000-cards-compromised-a-7268