-
Yu Ming Keung posted a new activity comment 7 years, 6 months ago
Domain 1: 60%
-
Yu Ming Keung posted a new activity comment 7 years, 6 months ago
Quiz 2 – 78%
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 6 months ago
Phishing emails are one of the most significant issues rising over the past year. it can deliver ransomware and other hazardous threats to businesses and enterprises of all sizes. Many advanced phishing emails […]
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 6 months ago
The article I read for this week is about a windows, android malware exploited by a cyberespionage group to target organizations in the Middle East. According to the security firms, the group uses Windows and […]
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 7 months ago
The threat was discovered in the mid of January this year when it was targeting multiple owners of Github repositories via phishing emails, but cyber-security firm Palo Alto, who reported the campaign on Tuesday, […]
-
Yu Ming Keung commented on the post, Instagram Has Two-Factor Authentication Now, So Turn It On, on the site 7 years, 7 months ago
Really interesting post, Sarush, I am not an Instagram user but I’m surprised that it took them so long to add that valuable security feature to protect the users. Two-facter authentication is effective to deter hackers because hackers would spend time to hack an account when they know a secondary token is going to be needed. However, at the same…[Read more]
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 7 months ago
Talking about the use of Big data in cybersecurity, it can help the government setting with a number of high-profile use case examples, how the internet-of-things(IoT) is taking a firm hold in helping government […]
-
To add to your post Yu Ming, these days big data techniques used to mine databases are being adopted by the military to glean more information from many different types of data it collects—from drones, automated cybersecurity systems, terrorist databases and many other sources which is helpful in performing military operations and hence is becoming a useful technology.
-
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 7 months ago
The biological national security is facing a dramatic issue and it may be ripped from the page because American pharmaceutical companies and the health-care sector are not doing enough to secure biological […]
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 7 months ago
According to the Symantec research, it showed that many workers are not aware of the security risks associated with using their own devices for business. This can expose IT and indeed the whole business to risks. […]
-
Yu Ming Keung commented on the post, Progress Report for Week Ending, February 9, on the site 7 years, 8 months ago
Very interesting article Ming, Trade-based money laundering is one of the most sophisticated methods of cleaning dirty money. Since you mentioned about invoicing for goods and services. Multiple invoicing is one of the most common method of TBML, which allows money launderers to receive multiple payments for the same product. I think ACL is one of…[Read more]
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
Detecting the Undetectable
This week, I read this article “Detecting the Undetectable” from Info-security magazine. Since modern breaches mostly involve a mix of chameleonic deception and clever automation, ena […]-
I like your article Yu Ming. In light of the fact that attacks are increasingly evolved and sophisticated, the reality is there is no longer a one size fits all approach to security. To defend against the modern cyber threat, organizations need a multiple-faced approach, and not to fall into the trap of implementing one measure. Those automated antivirus software or controls can easily be bypassed, which means that we need to think about defence-in-depth and monitoring-in-depth strategies to detect the undetectable.
-
-
Yu Ming Keung commented on the post, Week 03 – Discussion Question 3, on the site 7 years, 8 months ago
Bringing in millennials to the work place is beneficial for the organization because they can bring in new ideas in an advanced technology perspective. Embracing IT allow businesses to grow and expand much faster. Organizations who accelerate the integration of technology into workplace will enable workers to harness technology in way that allows…[Read more]
-
Yu Ming Keung commented on the post, Week 03 – Discussion Question 3, on the site 7 years, 8 months ago
Hey Laly, I strongly agree with you that millennials have a much deeper knowledge of digital information than the prior generations. And I believe that Audit and Assurance professions will be benefited by millennials from a technology perspective. Millennials never underestimate the willingness to embrace new technologies because they have grown…[Read more]
-
Yu Ming Keung commented on the post, Week 03 – Discussion Question 2, on the site 7 years, 8 months ago
Hey Lezile, I agree with you that both issues go hand in hand. In today’s environment, business can’t ignore the impact of technology because information technology is a vital components to a company’s operations and growth. For example, many companies have already embracing the IT innovation like launching their phone applications, resul…[Read more]
-
Yu Ming Keung commented on the post, Week 03 – Discussion Question 1, on the site 7 years, 8 months ago
Hey Mustafa, I like how you stated that auditors focus more on documents and are likely to create more findings that are not important. It is a good point and I never thought of that. You are right, “Less is More” and that “more” doesn’t always add value to the organisations/auditee. That kind of auditors works so hard but they don’t know what the…[Read more]
-
Yu Ming Keung commented on the post, Week 03 – Discussion Question 1, on the site 7 years, 8 months ago
Hey Alex, good post, I strongly agree with you that faker is the worst type of auditor. If they issue wrong opinions to the auditee, They can cause the most catastrophic damage to a business. There is a lot of sources available like COBIT 5, NIST for the auditor to refer to. A responsible auditor are meant to be reliable all the times!
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
I read an article in regards to a new concept “Fast Data” instead of Big data. Data is growing at a fast rate where each person will create roughly 1.7 megabytes of new data per second by 2020. With that being sai […]
-
Yu Ming, when it comes to fast data, it is important to capture the value in it properly. In fact, the best way to capture the value of incoming data is to react to it the instant it arrives. If businesses are processing incoming data in batches, they’ve already lost time and, thus, the value of that data. To process data arriving at tens of thousands to millions of events per second, they will need two technologies: First, a streaming system capable of delivering events as fast as they come in; and second, a data store capable of processing each item as fast as it arrives.
-
-
Yu Ming Keung commented on the post, Anthem Breach Revisited, on the site 7 years, 8 months ago
Thanks for shaving your takeaway from anthem breach. This article reminds me that 2 years ago, my friend got a fake email from PayPal saying that “sign up for this and you will get 5$ credit in your PayPal account. He did that and he told me to do so but I refused. He ended up didn’t get the five dollars and he contacted PayPal customer service.…[Read more]
-
Yu Ming Keung commented on the post, the importance of data analytics, on the site 7 years, 8 months ago
Good post Alex, I totally agree with your statement that “companies should not see data as the responsibility of IT only.” Data itself means nothing before data becomes information after it has been processed to add context, relevance and purpose in business. The ability to analyze and act on data is increasingly important to businesses.
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
I read an article of EY regarding using data analytic in fraud detection. Since we have learned that ACL/Data analytics can be one of the tools for auditors to detect fraud in our previous classes. Fraud is […]
- Load More
In the case of cybersecurity, fire must be fought with fire, or in this case, with automation. Companies must seek out and enforce preventative solutions that use automated methods of prevention. One such technology that preventatively protects companies and enterprises of all sizes is the Content Disarm and Reconstruction technology (CDR). CDR technology processes incoming files, analyzes and breaks down the content structure, then rebuilds a duplicate file with no loss of functionality – all in real-time. Through this process, end-users are able to receive any file, free of both known and unknown threats because CDR removes any content that is not approved by the organization. Machine learning is still in its early phases and phishing will only become more insidious as the technology matures and the process becomes even more automated.