-
Wen Ting Lu commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
Q:Why is so important to protect operating systems?
A:The operating system is the fundamental software that supports the basic functions of a computer. It serves as a basic control panel that manages the core of a computer. It is also the necessary tool for us to communicate with a computer which will further comprehend the data and information…[Read more]
-
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
Hospital Security Fears as Pagers Come Under Spotlight
This article talks about all healthcare organizations should immediately re-evaluate their use of pagers because unencrypted messages can be intercepted and spoofed with potentially life-threatening repercussions. Following are the key points that Trend Micro claimed in its new Leaking…[Read more]
-
Wen Ting Lu commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
Abhay, you are right. Some organizations’ account passwords have to be requested from help-desk, while others people are able to retrieve their password on their own. It really depends on where you working for. However, I agree with Wenlin that create password hints/reminders will reduce the frequency of people have to retrieve their passwords.…[Read more]
-
Wen Ting Lu commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
Professor Yao:
Blue screens are caused by hardware problems and issues with low-level software running in the Windows kernel. In addition, viruses and malware is one of the causes of blue screen.
-
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
Wen Ting Lu
MIS 5206
Case 1 HDFC Bank – Securing Online Banking
In this case analysis, I will describe the three major challenges that Vishal Salvi, the new Chief Information and Security Officer was facing, assess the pros and cons of each alternatives, and finally follow by the recommendations on how to overcome the challenges.
The first c…[Read more] -
Wen Ting Lu commented on the post, Week 4 Questions, on the site 8 years, 1 month ago
1. As customers, we experience various company’s order to cash process (OTC) whenever we buy something. Which company do you believe has a ‘great’ OTC process? Why?
a. I believe a company with great OTC process should be properly staffed at every single department including order entry, fulfillment, distribution, even customer services. I agree…[Read more]
-
Wen Ting Lu commented on the post, Week 4 Questions, on the site 8 years, 1 month ago
3. Who in a company should be responsible for the controls of that company’s order to cash process? Why?
I believe that the Chief Executive Officer should be responsible in terms of establishing a well-organized Order of Cash process chain that is properly staffed. The Chief Executive Officer has knowledge of entire company’s operational str…[Read more]
-
Wen Ting Lu commented on the post, Week 4 Questions, on the site 8 years, 1 month ago
4. What key (1-2) competencies does the person responsible in a company for the Order to Cash need to have? Why?
1. Technical skill is a must for the person who is responsible in a company for the OTC process. This person needs to have an understanding of how the OTC operates including what occurs in each parts of the process. Without having the…[Read more] -
Wen Ting Lu commented on the post, Week 4 Questions, on the site 8 years, 1 month ago
Annamarie, I totally agree with you. The person who is responsible in a company for the OTC should have technical skills and background of the OTC process. Without knowing what occurs within each step, it is very difficult for he/she to determine what are the potential threats and what actions should take in place to minimize or resolve the threats.
-
Wen Ting Lu commented on the post, Week 4 Questions, on the site 8 years, 1 month ago
This is a good question. I think what company such as Amazon should do is enhance their distribution process. They should have a contract with the shipping carrier to make sure the delivery person don’t leave the package unattended. In addition, they should make sure the customer signed when they received the package. In Ming Hu’s case, I think…[Read more]
-
Wen Ting Lu commented on the post, Week 4 Questions, on the site 8 years, 1 month ago
I agree with you that delivery process is vulnerable. I think a company with good OTC process should enhance their distribution process. Perhaps, when delivery to the customers make sure the package is delivered in person. The company should note the shipping carriers do not leave the package unattended, also the company should make sure that the…[Read more]
-
Wen Ting Lu commented on the post, Week 4 Questions, on the site 8 years, 1 month ago
2. What portion of the Order to Cash (OTC) process do they see as the most vulnerable to theft, fraud or failure of some kind? Explain.
a. As in a typical business model, every single part of the Order of Cash chain could be mistaken by human errors because the process is linked together. However, the fulfillment and distribution processes look…[Read more] -
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
Biometrics a Hit with UK Consumers
The article I read for this week is about nearly two out of three UK consumers favor to use biometrics to authenticate payments, with fingerprint scans the most popular method. The credit card giant polled around 2000 consumers in the UK as part of a Europe-wide Biometrics Payment study. According to the…[Read more]
-
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
Deepali, thanks for sharing.
I think you have a very good lists of principles and directives to create risk profile for small start up company , what risk profile for business contains, and the purpose of the risk profile include what it is for . In order to have a efficient risk profile, I would suggest to schedule appointments with employers…[Read more]
-
Wen Ting Lu commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Hi, Yu Ming
You brought up a great point. Many organizations invested large amount of money in monitoring, surveillance and anti-malware software. However, most organization didn’t invest enough in employee training which is extremely important. I believe employees are the biggest risk of the organization because they often lack the awareness…[Read more] -
Wen Ting Lu commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Hi, Sean
I totally agree with you. Database are big target for hackers, it’s especially vulnerable for DBMS because hole database is modified if one record is modified. Data is stored in a single large table, therefore a breach will have the access to the entire database information
-
Wen Ting Lu commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Another character of RDBMS is that it supports multiple users access which is not possible in DBMS.
RDBMS offers logical database independence in which data can be viewed in different ways by different users. -
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
Key benefits of relational databases vs traditional file system?
Multiple access- Database software allows data to be accessed in a variety of ways (through various key fields), by using several programming languages
Flexibility-Because programs and data are independent, programs do not have to be modified when types of unrelated data are…[Read more]
-
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
List risks associated with database management systems (DBMS)
-Concurrent Access Anomalies
multiple users using the same data will lead to inconsistent data problem
-DBMS does not apply any security with regards to data manipulation
– Whole database is modified if one record is modified. Data is stored in a single large table, therefore…[Read more] -
Wen Ting Lu posted a new activity comment 8 years, 1 month ago
What are key characters of relational database management systems?
• Data is stored in the forms of tables. In tables, data are stored in rows (records) and columns (field)
• Relationships are created and maintained across and among the data and the tables
• Designed to handle large amount of data, it supports multiple users
• Single databas…[Read more] - Load More