-
Sachin Shah commented on the post, Discussion Week 13, on the site 7 years ago
In the presentation, we see that there are two actions when not passing traffic… We can reject or deny. What is the difference between these? When might you use one or the other?
reject and deny in both cases result in a closed or gap in connectivity. Reject may mean that the data is corrupt or that a server is open but can not connect to a p…[Read more]
-
Sachin Shah commented on the post, Discussion Week 12, on the site 7 years ago
3. I think if a message comes in a format – the firewall can be adjusted to only look for that segment header. For instance I work with Hl7 messages which is healthcare standard and patient infirmation always starts with a “MSH” segment which is the header. These are allowed to pass otherwise they are firewall restricts the data. I know in our…[Read more]
-
Sachin Shah commented on the post, Discussion Week 11, on the site 7 years ago
Non-IT employees should have no access to these tools. I am a developer and not in security but I actually worked with vendors to address connectivity issues. I was able to download wireshark and packet sniffer tools. I work with vendors who have vpn accounts and we send data via HTTPs, TCP-IP and FTP. having these tools at my disposal lets us…[Read more]
-
Sachin Shah commented on the post, Discussion Week 9, on the site 7 years ago
Bring your own device is challenging in a work place. One of the hard things is if you have wi-fi and how secure is it. Is there a standard account for employees and a guest accountpassword. I know companies block apps to be used on their wi-fi. I know my company bans the use of many dating or personnel sites on their wi-fi. There are device…[Read more]
-
Sachin Shah commented on the post, Discussion Week 8, on the site 7 years ago
despite the low chances of a pandemic spreading to the staff, any company, not just IT staff needs to be somewhat pro-active. Most companies require a flu-shot now, in my job upon hiring they verified if I had gotten shots for chicken-pox and small-pox. Many companies when they hire people from oversees make sure they have certain shots like…[Read more]
-
Sachin Shah commented on the post, Discussion Week 6, on the site 7 years ago
great post Fred and explanation. Quantum computing is an off-shoot of Quantum Mechanics.. Standardization, Organization, and implementation may be decades away. Basically it is enhancing cyrptography in short -term but will be overtaking it long term.
-
Sachin Shah commented on the post, Discussion Week 5, on the site 7 years ago
In my line of work in healthcare, it is too dangerous to go open-source. There are HIPPA violations and patient care issues. I am at a big hospital and we have a mix of Open source and proprietary. Our emergency medical record is propritary and created by a large scale vendor. It is rough as we need them to have fixes, updates, changes in code and…[Read more]
-
Sachin Shah commented on the post, Discussion Week 4, on the site 7 years ago
I think it should be black-list model and its up to IT staff to implement. In my work their is a combination of white-list and black-list based on user credentials. For instance non-IT staff usually can not install anything outside the scope of their job. We also lock down computers from installation of applications unless they are administrators…[Read more]
-
Sachin Shah commented on the post, Discussion Week 3, on the site 7 years ago
I am like neil in that I grew up using Windows. But after learning Linux I understand its traits. linux is more secure and performance is better. Yet for large scale system Linux is a better operating system. I also feel lots of IT employees like myself should be better trained in this system. It is also better for people like us getting into…[Read more]
-
Sachin Shah commented on the post, Discussion Week 2, on the site 7 years ago
I work in a hospital and single sign was requested by clinicians as a way to alleviate users from remembering usernamepasswords for all systems and AD account. It is costly to implement. I think it is easier to start single sign on from ground up or have single sign-on for applications and a separate account for ADVPN, etc. The other drawback is…[Read more]
-
Sachin Shah wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Moving forward there are potential challenges for autonomous vehicles that may create for the future of cybersecurity. Risks such as hacking are one of the many threats linked with these cars. The Alliance for […]
-
Sachin Shah wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
This article starts with the concept that Schools should teach students learn how to stop malicious hackers by learning their ways. Imagine a world where security guards learn to be robbers first. The first step […]
-
Sachin Shah commented on the post, WHATSAPP HACK SHOWS THAT EVEN ENCRYPTION APPS ARE VULNERABLE IN A BROWSER, on the site 7 years ago
great post. I have friends who use this app or something of this sort sue to encrytion. More people do not use the standard SMS messaging on their phone due to no encryption. We see lots of encrypted things get uncrypted before and we shouldnt be surprised by it happening here.
-
Sachin Shah wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Air Force Major Jack Skoda, a cyber defense instructor in Vermont Air National Guard’s Information Operations Squadron, believes that cyberspace is “all around us, all the time.” I found it interesting how he […]
-
Sachin Shah wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Recently appointed Uber CEO Dara Khosrowshahi recently learned that in late 2016 that two individuals outside of the company had inappropriately accessed user data stored on a third-party cloud-based service: […]
-
Sachin Shah wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
This article taught me that there will be companies that will be subject to the European Union’s (EU) General Data Protection Regulation (GDPR) and most arear behind the May 25 compliance deadline. I found thi […]
-
Sachin Shah wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Cybersecurity is such a volatile industry in so many aspects. In 2016, breaches cost businesses nearly $4 billion in 2017 the number will be roughly 6 billion. The constant number of threats and attacks is […]
-
Sachin Shah wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
This article was shocking. First of all between now and 2021 cyber-security spending will exceed 1 TRILLION. What is more amazing is that that 1 trillion is not enough as hackers will commit cyber-security crimes […]
-
Sachin Shah wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
It seems as India is producing an army of “ethical hackers”, who earn millions protecting foreign corporations and global tech giants from security issues but are largely ignored at home in India. The skills are […]
-
Sachin Shah wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Professors are teaching students how to hack into pipelines, powerplants, and break into networks. Some Universities, such as Carnegie Mellon are even creating hacking teams. Teachers in the technology and […]
- Load More
It is a very concerning topic with the rise and growth of autonomous vehicles. If a vehicle was ever to be compromised by an attacker, there could be massive damage done to multiple people, organizations, and the surrounding environment. I’m really curious on how much of the security side is being considered as the technology grows.