Skip to main content

Home/ PA311-2011/ Group items tagged security

Rss Feed Group items tagged

Ron McKee

How Secure Is Cloud Computing? - 0 views

  •  
    Technology pop quiz for business owners: What's more secure? A. Data stored in redundant back-up server installations (or "the cloud"), automatically updated and maintained, in a facility secured from outside threats. Or B. Data stored or backed up to an on-site tape or flash drive, whenever the company's controller or non-IT back-office staffer remembers to do it - then left in the drive? For many, the answer in theory is A, but in practice, it's B. Why is this important? Because studies have shown that 70 percent of companies go out of business after a major data loss and 60 percent of companies that lose their data will shut down within six months. Yet those unfamiliar with cloud computing still believe onsite back-up is a safe, secure solution. Therein lies one of the most compelling reasons to embrace cloud or ERP (enterprise resource planning) computing.
Ron McKee

FBI - The Cyber Threat: Who's Doing What to Whom? - 0 views

  •  
    Speech by Steven R. Chabinsky, Deputy Assistant Director, Cyber Division, Federal Bureau of Investigation  - delivered March 23, 2010 "...to talk with you about the cyber threat, why it's important, and how you can help your organizations-and in doing so, help our country-rise to this enormous challenge. Some of you no doubt are on the front lines of the cyber security problem and are quite familiar with it, while others of you may only have passing familiarity with this growing problem. First, let me share with you the importance of the cyber security problem from the lens of the FBI. As you know, the FBI is a law enforcement agency that investigates hundreds of federal crimes as well as a domestic national security agency that combats terrorism, espionage, treason, and sabotage.
Ron McKee

Protecting Cyberspace as a National Asset Act of 2010 (S.3480) - Senate version of the ... - 0 views

  •  
    A Senate bill sponsored by: Sen Lieberman, Joseph I. [CT] Establishes in the Executive Office of the President an Office of Cyberspace Policy, which shall: (1) develop a national strategy to increase the security and resiliency of cyberspace; (2) oversee, coordinate, and integrate federal policies and activities relating to cyberspace security and resiliency; (3) ensure that all federal agencies comply with appropriate guidelines, policies, and directives from the Department of Homeland Security (DHS), other federal agencies with responsibilities relating to cyberspace security or resiliency, and the National Center for Cybersecurity and Communications (established by this Act); and (4) ensure that federal agencies have access to, receive, and appropriately disseminate law enforcement, intelligence, terrorism, and any other information relevant to the security of specified federal, military, and intelligence information infrastructure.
Ron McKee

Court Likely to Uphold Constitutionality of 'Nude' Airport Scanners | Threat Level | Wi... - 0 views

  •  
    Airline passengers in the United States understand they will be treated as suspected terrorists when going through airport security checkpoints. Yet nearly a decade after the Sept. 11, 2001 terror attacks, airport security has become a lot more invasive with the rollout of the so-called "advanced imaging technology" scanners, paid for with $1 billion in stimulus funds. The scanners - now deployed at about 78 airports - use either millimeter wave or backscatter technology to create a virtual picture of the traveler's naked body. The image is then viewed by a screener  with the Transportation Security Agency iin a sequestered room away from the checkpoint.
Mitchell Crase

Fixing the IE 8 warning - 'Do you want to view only the webpage content that was delive... - 1 views

  •  
    some info on the secure content box which can popup over and over and over and over and over if somebody doesn't get a handle on it
  •  
    The evil secure content popup box terrorizing websites going to the cloud can be stopped!
Ron McKee

Holes Remain in Smart Grid's Cyber-Security Standards - 1 views

  •  
    Key security issues still need to be addressed as IT is integrated into the nation's electricity infrastructure, according to a recent report released by the U.S. Government Accountability Office (GAO). date: article e-published on January 17, 2011 by the News Staff of Government Technology.
Colin Moore

Suspicious Activity Reporting Is Now Mobile - In Kentucky - 0 views

  •  
    The Kentucky Office Of Homeland Security (KOHS) has released an iPhone app that allows users to be "the eyes and ears" of Kentucky in hopes to prevent domestic terror attacks. The app allows users to submit information on suspects who act strangely, ask questions about building security, or other such things. The app also allows users to submit information anonymously.
Ron McKee

FBI - The Intel-Driven FBI - 0 views

  •  
    See photo at top left of article showcasing one of their high-tech, computer laden facilities on display for this article "What are the most significant security threats? What do we know about them? What don't we know? What is just around the corner that we should be preparing for now? These are the kinds of questions we ask ourselves every day. It's part of our intelligence-driven, threat-based, future-focused approach to defending the country from a range of national security and major crime threats. Today, the FBI combines its investigations and intelligence operations to be more predictive and preventative-more aware of emerging threats and better able to stop them before they turn into crimes. "
Ron McKee

Press . Homeland Security Senate Committee -- "LIEBERMAN, COLLINS, CARPER STATEMENT ON ... - 0 views

  •  
    A governmental style press release on the official website of the "United States Senate Committee on Homeland Security and Government Affairs".  A response to the Mubarak government's shut down of the Internet in Egypt.
Mitchell Crase

How Telecommunications Is Changing Work for Nonprofits - 0 views

  •  
    This article suggests what the telecommunications solution should look like. A secure VPN to share files, Instant messaging to cover long distance calling, web conferencing for a more personal long distance interaction if and when needed , VoIP and PBX which might be the most prominent. Keeping the workforce strongly connected over long distances makes people more productive and happier.
  •  
    I think this best represents the standard platform but there is much more available now ( look to mobile for growth )
Ron McKee

U.S. Anti-Child Pornography Operation Accidentally Shuts Down 84,000 Sites - 0 views

  •  
    "In an effort to crack down on child pornography, the Department of Homeland Security (DHS) and Department of Justice (DOJ) announced the seizure of 10 domains as a part of a new initiative called "Operation Protect Our Children" but they also shut down 84,000 seemingly innocent sites in the process."   A clear example of how attempting to exercise government control over the Internet in the United States on a even a small scale can present problems that were not the intent of the US gov. officials & decision makers!!!!!
Ron McKee

Global Security Newswire - Print_Friendly - - 1 views

  •  
    Pentagon funded study by the Center for Strategic and International Studies brings up terrorists' use of Facebook for recruitment and more....
Colin Moore

Border Security Website Sparks Political Outrage - 0 views

  •  
    A website, www.protectyourtexasborder.com, launched March 3rd, which was originally intended to be a forum for farmers, ranchers, and other border dwellers to discuss border violence spawned by illegal immigrants and drug smugglers, has "turned into a political hot potato". It has spawned some senators to call for its removal because it "exaggerates the problem" faced on the borders. U.S. Rep. Silvestre Reyes, D-El Paso, has spearheaded the campaign for its removal, citing it as a waste of tax payer dollars as well as breeding hate speech and other such things.
Ron McKee

Dropbox Lack of Security - Miguel de Icaza in a blog posting - 1 views

  •  
    Clarification - the description is an excerpt beginning with the 4th paragraph of the article. Not my words. "My problem is that for as long as I have tried to figure out, Dropbox made some bold claims about how your files were encrypted and how nobody had access to them, with statements like: All transmission of file data occurs over an encrypted channel (SSL). All files stored on Dropbox servers are encrypted (AES-256) Dropbox employees aren't able to access user files, and when troubleshooting an account they only have access to file metadata (filenames, file sizes, etc., not the file contents)."
Michael Bennett

More Americans borrow neighbor's Wi-Fi connection - 1 views

  •  
    Although this article speaks mainly about protecting yourself on a network I think it applied very well with this class. It offers many good tips and points as to precautions to take to protect yourself. These precautions are important to consider especially if any work at your non-profit or public place of employment can be completed outside of work at at perhaps a local "hot-spot". This leads me to wonder how safe the new cellphone hot-spots are.
anonymous

Google launches two-factor authentication - 1 views

  •  
    Great timing!  Google just launched two-factor authentication for every Google account. Absolutely something administrators should use for organizations; and something worth enabling for all users, as well. Nice! Andy
1 - 20 of 29 Next ›
Showing 20 items per page