Date Range
Date Range
Date Range
Wednesday, June 1, 2016. Week 12 - Ethics who needs it? Ethics. Who needs it? As I finish up my Graduate career, I had to really think about what my last Blog as a graduate student will be.
Wednesday, February 26, 2014. Thursday, February 20, 2014. Qualifications and Requirements for Information Security personnel. Should certifications take the place of work expereince? Should qualifications even come into play for these type of positions? Thursday, February 13, 2014. Wednesday, February 5, 2014. Friday, January 31, 2014. Threat and Hazard Identification and Risk Assessment. Friday, January 24, 2014. Thursday, January 16, 2014. Security Education, Training, and Awareness.
Information Security Trends blogged from ATL. This week, we were instructed to do an overview of our posts for the semester and then discuss the topics we covered and whether or not they would be useful for an Information Security professional. Especially in regards to security professionals? And if so, which ones? A single.
Friday, February 28, 2014. I had posts on Security considerations for contract workers, security equipment, Government IT issues, Risk Management systems, standards in cyber security, secure cellphones, and data breaches. Sunday, February 23, 2014. Data Lessons from the NSA.
Saturday, February 28, 2015. Week 12 - The Lessons of Threat Modeling. The threat modeling is a common assessment that every individual performs daily. When we are driving or addressing home security, we implicitly assess the threats that pose a risk to our being. Organizations approach threat modeling in the same manner. What threats and vulnerabilities may impact the existence of the company? Shostack, A. Monday, February 16, 2015.