-
Yu Ming Keung posted a new activity comment 8 years ago
What are the advantages of VPN?
VPN is a technology which creates a virtual private network to which end users are connected via an encrypted channel.. VPN has three main advantages for the internet users, higher security, privacy protection and access to restricted resources.
Security:
Compared to direct connection, VPN provides a…[Read more] -
Yu Ming Keung commented on the post, Week 5 Questions, on the site 8 years ago
Hi Priya,
Really great post, The environment part you mentioned is very helpful in understanding the whole scenario of Mr. cash’s story. The culture, the environment, working atmospheres and controls attract Mr. Cash to become a theft. He is working on the assembly line and he had access to all different car components. I think that by…[Read more]
-
Yu Ming Keung posted a new activity comment 8 years ago
As consumers we encounter (knowingly and unknowingly) inventory controls all the time (e.g. locked jewelry cases). What are 1-2 less obvious inventory control measures used. Are these measures effective?
As a customer walking into a shop, we might only see some security guards or jewelry cases but there are many inventory control to prevent i…[Read more]
-
Yu Ming Keung commented on the post, Week 5 Questions, on the site 8 years ago
1 Controls are important in all the OTC processes including shipping. What would be different in the controls of a purely domestic company vs. an international company? Give 1 – 2 specific examples.
Compared to domestic shipping, international shipping often times pose higher risk for the customers. Since international shipping will often tak…[Read more]
-
Yu Ming Keung posted a new activity comment 8 years ago
All good points!
I agree with Said, Instead of employee bag check, installing security cameras could prevent employees theft. Like Amazon, Apple was sued by a class representing 12,000 employees, arguing time spent complying with an “Employee Package and Bag Searches” security policy amounted to compensable overtime under the Fair Labor…[Read more]
-
Yu Ming Keung commented on the post, Week 5 Questions, on the site 8 years ago
Hi Said,
You are right, with incentives, employees would look for opportunities to commit fraud and they would comfort themselves that it wouldn’t hurt the company as a whole. I really liked how you summarized the three element of the fraud triangle into two sensitives. It is not rare to see an employee like John to commit fraud in the company…[Read more]
-
Yu Ming Keung commented on the post, Week 5 Questions, on the site 8 years ago
Hi Paul,
Great post, the surprise inventory count can give employees deterrence so that they would be afraid to get caught. And I strongly agree with the measure of tracking of scrap material, which could help the organization identify which part of its processes needs to be improved in order to create less waste. This control could be…[Read more]
-
Yu Ming Keung commented on the post, Week 5 Questions, on the site 8 years ago
2 Assume the ‘One Piece at a Time’ video scenario could happen. If you are the operations manager responsible for the assembly line, what 1-2 key controls would you implement? Explain how the control addresses the risk.
If I were the operation manager of the assembly line, I would implement an inventory check to address the risk of employ…[Read more]
-
Yu Ming Keung posted a new activity comment 8 years ago
1 Using the Fraud Triangle analyze the ‘One Piece at a Time’ video scenario and explain how the environment was favorable to Fraud.
The Fraud triangle consists of three factors that result in someone committing occupational frauds. Those factors are pressure/incentive, perceived opportunity and rationalization.
Johnny is an autoworker on the…[Read more] -
Yu Ming Keung posted a new activity comment 8 years ago
Brits in Biometrics Boost as 20% Use Fingerprint Tech
While PINs and passwords (63%) are still the most popular way to authenticate via the device, nearly a quarter of respondents (21%) said they use fingerprint sensors to do so. This article highlights that pins and passwords are not safe anymore and there is a growing need and influence of…[Read more]
-
Yu Ming Keung posted a new activity comment 8 years ago
Hi Vaibhav,
Thanks for sharing this news, I think that we should avoid giving our personal information in some unsecured websites, but in fact, it is hard to define which website has lower security so I will tend to trust large companies because they would invest more in securing their websites.
-
Yu Ming Keung posted a new activity comment 8 years ago
Hi Said,
Interesting article, I also used to think that Apple computers or its OSs are more secured against cyber attacks. In fact, none of the operating systems(Linux, MacOS, Windows) are perfect in security. Employees can still open phishing emails even though the OSs are perfectly secured. I recalled from our class that some organizations…[Read more]
-
Yu Ming Keung posted a new activity comment 8 years ago
Interesting article Yulun,
In fact, security is not just about information security of an organization but all electric devices including cars, mobile phones and computers. I am imagining that how dangerous and scary it is to remote a testa car while someone is using the auto drive feature of Testa.
-
Yu Ming Keung posted a new activity comment 8 years ago
Hi Ian,
The mobile devices have been one of the weakest links in corporate security because most organizations have began using mobile devices to increase the operational efficiencies but they don’t have strong control or security in place. It is very important for the organizations to take it serious to set up strict policies for whose…[Read more]
-
Yu Ming Keung commented on the post, Week 4 & 5 Questions, on the site 8 years ago
Good point Fangzhou,
It is too risky to store all the sensitive information in our operating system without appropriate security on the operating systems. If the OS allows unauthorized assess to the organization data, it can lead to system downtime, virus, trojan, or data stolen.
-
Yu Ming Keung commented on the post, Week 4 & 5 Questions, on the site 8 years ago
Nice post Abhay,
I agree that weak password or black passwords can put the organization at risk. Choosing a complicated password can increase the number of possible combinations of password. I would add to that the system should block the account or require secondary authentication if an incorrect password is entered too many times in order to…[Read more]
-
Yu Ming Keung posted a new activity comment 8 years ago
Hi,
Patches can slightly strengthen the resistance to malware such as zero day attack. However, I don’t think patch can affectively remediate risks caused by zero day attack because patch management and update takes longer time to write so the system can be compromised before the vulnerability is fixed. Zero-day threats are always one step…[Read more]
-
Yu Ming Keung posted a new activity comment 8 years ago
3. What are the challenges faced by Salvi?
According to the beginning of the case, Vishal Salvi, the new Chief Information and Security Officer of HDFC was facing three dilemmas in strengthening the bank’s online security following a phishing attack in 2007, affecting 1.28 million online banking customers. Those challenges.
First dilemmas: H…[Read more]
-
Yu Ming Keung posted a new activity comment 8 years ago
2. List common Control issues associated with operating systems and remediation strategy/plan.
Common control issues:
1. Weak password setting
– Having certain requirements of password setting
– Constant change of password
2. Lack of malware protection
– Firewall
– Anti-virus software
– Hire hackers to hack to system to see how well the…[Read more] -
Yu Ming Keung posted a new activity comment 8 years ago
1. Why is so important to protect operating systems?
In a business perspective, computer system is the basic operating asset of a company where it stores the most essential and sensitive data. An operating system is the platform of a computer, which supports a computer’s basic functions, such as scheduling tasks, executing applications, and…[Read more]
- Load More