-
Yang Li Kang commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
As we learned from answering the second question, Yes, operating systems do offer some level of security but they are not as secured. Additional layers of security in the form of third party applications such as antivirus and administrative policies should be implemented.
-
Yang Li Kang commented on the post, Week 4 & 5 Questions, on the site 8 years, 1 month ago
Definitely, there should be an administrative policy regarding malware such as using personal flash drives on company computers, visiting suspicious websites on company network. Employee training on security awareness will supplement administrative policies so it makes sense to the employee on why such policies exist in the first place.
-
Yang Li Kang posted a new activity comment 8 years, 1 month ago
What are the challenges faced by Salvi?
In August 2007, HDFC Bank, one of India’s leading private banks was a target of a phishing attack. Customers received e-mails claiming to have originated from the bank and seeking sensitive account information, including password and personal identification codes. Phishing is one of the most common o…[Read more]
-
Yang Li Kang posted a new activity comment 8 years, 1 month ago
List common control issues associated with operating systems and remediation strategy/plan.
1) Lack of malware protection and firewall – Installing antivirus and firewall
2) Poor password policy – Establishing a strong IT governance which educates employee to use strong passwords.
3) Missing patches/ system updates – DBA keeping up to dat…[Read more] -
Yang Li Kang posted a new activity comment 8 years, 1 month ago
Why is so important to protect operating systems?
An operating system is the most significant system software related to a computer. It contains programs that interface between the user, processor and applications software. It provides the primary means of managing the sharing and use of computer resources such as processor, memory and I/O…[Read more]
-
Yang Li Kang posted a new activity comment 8 years, 2 months ago
Tech giants team up to improve internet security
Major tech companies such as Twitter, Dropbox and Uber have joined forces and launched the Vendor Security Alliance (VSA), a coalition whose goal is to improve internet security. VSA’s goal is to streamline the evaluation process for vendors through a standardized cyber security evaluation to a…[Read more]
-
Yang Li Kang changed their profile picture 8 years, 2 months ago
-
Yang Li Kang commented on the post, Progress Report for Week Ending, September 22, on the site 8 years, 2 months ago
Can anyone guide me on how to give my VM a static IP address? I tried searching online and found this: http://kb.parallels.com/en/112093
I did it as shown on the site and I immediately got disconnected from my VM.
-
Yang Li Kang wrote a new post on the site Yang Li Kang 8 years, 2 months ago
Yang Li KangMS in IT Auditing and Cyber Security, Fox School of Business, Temple University.
Graduation: August 2017
BBA in Actuarial Science with Minor in MIS, Fox School of Business, Temple U […] -
Yang Li Kang created the site Yang Li Kang 8 years, 2 months ago
-
Yang Li Kang changed their profile picture 8 years, 2 months ago
-
Yang Li Kang commented on the post, Week 3 Questions, on the site 8 years, 2 months ago
Exactly! Technology are here to simplify and enhance business functions. People are still the one behind the technology. They create it, they maintain it, they operate it and they can also break it. Employee training is definitely one of the most important policy that organizations should prioritize.
-
Yang Li Kang commented on the post, Weekly Question #4: Complete by February 15, 2017, on the site 8 years, 2 months ago
Thank you for sharing. Now that you mentioned it, I also experienced the same situation where I am always asked to update my database application whenever I open it and have been informed to not update the application. Whenever a new employee comes, they are always informed to not update the system.
-
Yang Li Kang commented on the post, Week 3 Questions, on the site 8 years, 2 months ago
Thanks for sharing. I would also like to add that data corruption in DBMS is a big risk since the entire organization rely on the same database. Multiple departments may be using the corrupt data which could lead to a big mess that will be hard to correct.
-
Yang Li Kang commented on the post, Weekly Question #4: Complete by February 15, 2017, on the site 8 years, 2 months ago
Great! As you explained, DBMS stores data in structured method through relational model which allows easier use of data.
-
Yang Li Kang commented on the post, Week 3 Questions, on the site 8 years, 2 months ago
That is true. By unifying the database, it brings about a new threat where an intruder from any of the multiple access point will cause the entire information in the database to get stolen.
-
Yang Li Kang posted a new activity comment 8 years, 2 months ago
List risks associated with database management systems (DBMS)
-If the integrity of data is compromised, the whole organization will be affected.
-A breach will allow access to the entire database information.
-Database failure will severely affect the organization’s ability to function
-Virus/malware/infection will affect the entire database. -
Yang Li Kang posted a new activity comment 8 years, 2 months ago
Key benefits of relational databases vs traditional file system?
In a traditional file system, each department will have their own file system. Most of the time, each department will need information from other departments so, they will have to copy information from other systems into their own. This creates a redundancy and a waste of space as…[Read more]
-
Yang Li Kang posted a new activity comment 8 years, 2 months ago
What are key characters of relational database management systems?
– Stores data in tables in the form of rows and columns
– Has primary key, to uniquely identify the rows
– Creates indexes for quicker data retrieval
– Ability to view data through creating a virtual table with customizable queries
– Multi-user access and sharing of data -
Yang Li Kang posted a new activity comment 8 years, 2 months ago
What is meant by the term “acceptable information system security risk”? Who within the organization determines what is the acceptable level of information system risk? How does an organization determine what is an acceptable level of risk?
The term “acceptable information system security risk” is the level of risk that a company is able to…[Read more]
- Load More