-
Wen Ting Lu posted a new activity comment 8 years ago
OpenJPEG Flaw Allows Code Execution via Malicious Image Files
For those of you who are not sure what OpenJPEG is, it is an open-source library designed for encoding and decoding JPEG2000 images, a format that is often used to embed image files inside PDF documents. OpenJPEG is used by several popular PDF readers, including PDFium, the default…[Read more]
-
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
Hi, Yu Ming
I actually found this online, it’s shared in one of the tutorial video. I thought it’s interesting so I would like to share with everyone. Back to your question, I don’t think “Please Do Not Tell Sales People Anything” connects with the OSI model be honest. Maybe because sales people and consumers like us are two parties like two end…[Read more] -
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
Hi, Said
Absolutely, there are cons of VPN:
1. Reduced Internet connection speed
2. Reduced Connection Reliability
-more points of possible failure= less reliable
3. May provide less bandwidth than a dedicated line solution
4. Different VPN manufactures may comply with different standards -
Wen Ting Lu commented on the post, Week 6 Questions, on the site 8 years, 1 month ago
I believe preventive control should taking place to mitigate the risk such as downloading movies and music illegal. Preventive control such as set up authorization of websites that employees can visit. I remembered when I was back in high school, we use to have independence study class. I was trying to watch something on Youtube but I wasn’t…[Read more]
-
Wen Ting Lu commented on the post, Week 5 Questions, on the site 8 years, 1 month ago
4. As consumers we encounter (knowingly and unknowingly) inventory controls all the time (e.g. locked jewelry cases). What are 1-2 less obvious inventory control measures used. Are these measures effective?
One less obvious inventory control measure is security camera, it’s effective to implement security camera inside the store. However, i…[Read more]
-
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
3. Controls are important in all the OTC processes including shipping. What would be different in the controls of a purely domestic company vs. an international company? Give 1 – 2 specific examples.
International shipping opens doors to many new opportunities, however there is a greater risk of fraud. When you ship or receive a package i…[Read more]
-
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
You are absolutely right! Even though VPN has so many advantages but not all VPN service providers are trustworthy. It’s very important to find the best VPN service for your needs. Things should be take into consideration such as:
-What Protocols Do They Support?
-How Many Servers Do They Have and Where?
-How Many Concurrent Connections Are…[Read more] -
Wen Ting Lu commented on the post, Week 6 Questions, on the site 8 years, 1 month ago
Two mnemonics to help you remember the seven layers.
1. All People Seem To Need Data Processing
2. Please Do Not Tell Sales People Anything -
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
What is OSI model? What’s the main function of each OSI layer?
OSI stands for Open System Interconnection, OSI model is a standard reference model for communication between two end users in a network.
ISO has 7 layers, each layer has well defined functions. Seven layers are divides into two groups. The low layers (1, 2, 3 and 4) are t…[Read more]
-
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
What are the advantages of VPN?
VPN stands for Virtual Private Network, it is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider.
VPN has the following advantages:
1. Data is kept secured and encrypted when you connect to the network…[Read more]
-
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
2. Assume the ‘One Piece at a Time’ video scenario could happen. If you are the operations manager responsible for the assembly line, what 1-2 key controls would you implement? Explain how the control addresses the risk.
A: If I am the operations manager responsible for the assembly line I would implement the following controls:
1. I wil…[Read more]
-
Wen Ting Lu commented on the post, Week 5 Questions, on the site 8 years, 1 month ago
I agree with you, implementing security cameras and guards at the assembly serve as detective controls. Managers can look at video of employee’s actions throughout the day to detect potential theft. In addition, having guards can quickly detect and notify management of attempts by employees or outsiders to steal company’s inventory or other a…[Read more]
-
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
Hi, Yu Ming
I like you mentioned about implement inventory check, this is very important because it monitor the amount of inventory is up to date.
Your second suggestion brought up the ethical dilemma that employees might facing in work environment.
For my personal opinion I would prefer to give employee bonus when he/she has achieve a high…[Read more] -
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
1. Using the Fraud Triangle analyze the ‘One Piece at a Time’ video scenario and explain how the environment was favorable to Fraud.
A: The Fraud Triangle framework states that an individual is motivated to commit fraud when three factors come together: the pressure on the individual, the opportunity to commit fraud and the ability to rat…[Read more]
-
Wen Ting Lu commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
I agree with you! The reason why “Zero-day attack” has its name is because it is exploited and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability. Therefore, patch cannot effectively remediate the risk caused by “zero day” attack
-
Wen Ting Lu commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
Hi, Paul
Thanks for sharing, very interesting technique! I think this technique helps solve the problem with passwords being too simple, but I believe there is still possibility that people will forget about the phrase. Adding password hints might be a good idea. -
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
Hi, Said.
I agree that hackers might be favorable to windows operating system because a lot individuals and businesses use it today. It’s interesting that I was reading a report earlier, the statistics showing that Apple OS X ranked as most vulnerable operating system.
I think all operating system are vulnerable to hackers, however the risks…[Read more] -
Wen Ting Lu commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
Ian, I really like the analogy you brought up and It’s very easy to understand. You are right that operating system is software that supports the functions of a computer, just like managers who play major role in companies. People tend to choose the operating systems that they like, just like employees might switching jobs because they don’t like…[Read more]
-
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
I think Mainframe computers are easier to protect for the following reasons:
1. Mainframe computers provide for complete protection of all data from unauthorized reading and writing
2.Mainframe computers are usually kept behind locked doors in a secure data center.
3.Mainframe computer security provides several additional access control…[Read more] -
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
Q:List common control issues associated with operating systems and remediation strategy/plan.
A: Some common control issues associated with operating systems:
-Mandatory/Hidden installations of 3rd party softwares and plug-ins
-Malware while surfing on the internet
-Operating system becomes extremely slow
-Application…[Read more] - Load More