-
Paul O. Thomas commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 9 years, 8 months ago
Role which CAs play in the Public Key Infrastructure (PKI).
1. A request for a certificate is sent to the CA.
2. The CA authenticates the user, and then issues a digital certificate to the requestor.
3. The CA publishes the certificate in a public certificate store, so that the receiver of messages can authenticate the CA.
4. When the key is…[Read more] -
Paul O. Thomas commented on the post, NIST 800 60 V1R1 Guide for Mapping Types of Information and Information Systems to Security Categories, on the site 9 years, 8 months ago
Cyber security in 2015: What to expect
Summary: Breaches of information security and individual privacy hit the headlines regularly in 2014. But how will the arms race between cyber-attackers and defenders develop in the coming year? We analyze the experts’…[Read more]
-
Paul O. Thomas commented on the post, Progress Report for Week Ending, September 29, on the site 9 years, 8 months ago
Flash zero-day flaw under attack to spread ad malware, botnet
Summary: New attacks on Flash Player may force Adobe to issue another patch just days after fixing nine flaws. -
Paul O. Thomas commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 9 years, 8 months ago
An Enterprise Security Program and Architecture to Support Business Drivers
August 2013 by Brian RitchotThis article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. Please…[Read more]
-
Paul O. Thomas commented on the post, Progress Report for Week Ending, September 29, on the site 9 years, 8 months ago
Hey Guys, this is the link to the PDF copy of the book (A Patttern Language) Prof. Senko mentioned in class.
http://library.uniteddiversity.coop/Ecological_Building/A_Pattern_Language.pdf
-
Paul O. Thomas commented on the post, More details about Point-of-Sale vulnerabilities, on the site 10 years, 1 month ago
Where Did Healthcare.gov Go Wrong?
This story was first reported by the wall Street Journal. Some foreign hacker uploaded malware into a test server. The breach happened because of a series of mistakes. The news group reports that a computer server that routinely tests portions of the Web site was not set up correctly and was never supposed…[Read more] -
Paul O. Thomas commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 10 years, 1 month ago
How muck risk can or should a company allow/accept in the course of doing business?
-
Paul O. Thomas commented on the post, Progress Report for Week Ending, September 22, on the site 10 years, 1 month ago
Vacca:
The goal of any discussion with management is to convince them that in the highly technical and interconnected world we live in, having a secure network and infrastructure is a “nonnegotiable requirement of doing business”.RISK: “IT Risk” is a known business risk because it is a component of the overall risk universe of the enterprise/business.
-
Paul O. Thomas commented on the post, Progress Report for Week Ending, September 29, on the site 10 years, 1 month ago
Goodwill: 868,000 Cards Compromised
Goodwill confirmed that 330 stores were affected due to Malware from a third-party vendor used “to process credit card payments” . Please see link for full story
http://www.databreachtoday.com/goodwill-868000-cards-compromised-a-7268