Certified Information Security Manager

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 15 of 50 - About 500 Essays
  • Improved Essays

    Week two of our material provided us with several different elements of the homeland security assessment process. What I gathered most from the material was based on the “Baldrige Assessment Criteria and the eight step process for a successful assessment” (Fisher, 2004). However, the consensus is that the key elements in the homeland security assessment process are “a threat assessment, a vulnerability assessment and a criticality assessment” (Decker, 2001). In my opinion, these three key…

    • 626 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Therac-25 Design Flaws

    • 581 Words
    • 3 Pages

    The computer technology is a double edged weapon and this was the case in the therac-25 as its purpose was to treat patients, but as a result of the misuse of computer technology it harmed six innocent people. The problem with the design of the machine was that it was mainly controlled by its software and not its hardware. The programmer did not take into consideration that he was designing a machine that emits dangerous types of radiation that can be life threatening if they are not well…

    • 581 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    NT1330 Unit 1 Essay

    • 486 Words
    • 2 Pages

    and applications to search and find the smart thing's services they need, however in this section the main concern is to know more the next layer which is sharing layer. This layer’s main concern is to keep human and machine updated with the new information so the main concern was making this communication secure and free from hacks so researchers tried to use already existing protocols like HTTP that is already provides authentication mechanisms for securely sharing resources by which it allows…

    • 486 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    take the right precautions and keep information secure to prevent any identity theft from occurring. Keeping Information Private According to USA.gov, there are a number of ways to prevent identity theft. It is important to keep passwords private and not to share them with anyone or let anyone see you typing in passwords so they cannot login to your private information. Another important way to prevent identity theft would be to not share personal information…

    • 481 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Introduction In 2017, there have been several high profile cyber-attacks that have affected various systems across the country and the world. Among these cyber-criminals is the group known as the Shadow Brokers who debuted in August 2016 after claiming to have breached the spy tools of the Equation Group, an elite NSA-linked operation. In April 2017, the Shadow Brokers released what is said to be significant NSA tools which individuals have used to infect computer systems with ransomware. As a…

    • 657 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Security Forces Outline

    • 705 Words
    • 3 Pages

    Bradlee Shipley COMM200 11 October 2015 PREPARATION OUTLINE-Security Forces Purpose Statement: To inform my audience about my choice to join the United States Air Force Security Forces career field. Thesis Statement: The Security Forces (SF) career field requires an understanding of military jurisdiction, use of force procedures and the operations and training functions in order to be a capable security forces member. Introduction Attention Getter: Today, I’ll be discussing military…

    • 705 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The best way to evaluate a denial of service (DoS) incident is to base it on the incident analysis that was previously done. From the analysis we had gathered valuable information and this is my evaluation. After getting complaints that the network was running slow I immediately started to do an incident analysis to find out what was happening (Tipton & Frause 2007). So, I decided to use the National Institute of Standards and Technology methodology to seek the answers. Using the Detection…

    • 337 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    several times and have always been frustrating the IT professionals. It’s great that each day technology is taking new phases and flourishing its potentiality, but the advancing field is also becoming a growing opportunity for invaders to breach security. By the time you recognize the attack, damage is already done, leaving you with nothing but an infected system. To prevent potential data injury, you need to be quick and proactive. Here are few steps that can help offset the deadly…

    • 409 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    and~\ref{aaadrawbacks}, the current solution of AAA has various vulnerabilities and limitations. These vulnerabilities has caused user data hijack and breach, identity theft and financial loss. These issues are becoming more common and frequent which has sparked the security concerns over current AAA framework and end-user are becoming more concerned about their digital identity and privacy. Beside these, repeated user registration across different services respectively, to use services is…

    • 686 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    converged technology within an organisation should be a conscious decision, however, with wireless there exists a very real threat of unauthorised implementations. This ultimately creates a risk to the information assets within an organisation, even when there is no perceived threat. So in the security policy the organisation can state its stance upon the installation of wireless access points, in that at the very least they must have prior authorisation and adhere to specific configurations.…

    • 278 Words
    • 2 Pages
    Decent Essays
  • Page 1 12 13 14 15 16 17 18 19 50