MY PERSONAL REFLECTIVE VIDEOS

MY REFLECTION ON THE BLOCK TEACHING

Image Posted on Updated on

I enjoyed every bit of the lecture sessions as the lectures were very engaging. We learnt about CLOUD COMPUTING and the class was divided into groups for further discussions on the topic after which each group gave a presentation of their reflections. One brainstorming question that got the class uproar is WHO GOVERNS THE CLOUD? A lot of responses were generated from this question ranging from Individual, to Organizations, the Government etc.
A touching part of the block is the reflection on how to make the internet more accessible for Paraplegic Olympians. We worked in groups also and each group discussed different factors like political, Economic, Technological, and so on. My group discussed the Customer needs and we responded actively.
Another interesting session is the LEGO introduced by Dr. Marie. We were to construct different innovative ideas we have. The whole essence of this is to how IT innovative we can and the potentials that exist on our subconscious

LEGO

.

INFORMATION SECURITY BEST PRACTICES FOR SMALL BUSINESSES BY WARD BUCHANAN- Part 1

Video Posted on Updated on

This Video by Ward Buchanan stresses Stresses the need for effective Information Security in SMEs. He said many small Business owners think they do not need to invest in Information Security because it is expensive, does not reduce their operating cost and does not generate revenue in any way but his response  is that not been Information Security conscious has the potential to ruin the whole business so it is left to Business owners to decide wisely.
He further said “in this age where cyber crime has grown at an enormous rate, it is not an option not to have protection in place”. Adding that the level of IS in any SME should be commensurate with the level of business they are doing because different types of business collect and store different types of data e.g health care businesses are expected to store patient information and therefore need to protect and ensure patience’s privacy or risk facing legal battles for leaking patient health information. He listed out possible threats are outlined such threats include:
• Computer Viruses
• Identity theft,
• Data loss,
• Employee fraud and theft
• Loss of physical equipment
The impact these threats can have on the business amongst others are also iterated below
• Loss of Proprietary Information
• Loss of Financial Information
• Loss of customer information and confidence
• Litigation
• Penalties- Government penalties for not taking efficient pre-emptive measures.
Listed below are the requirements to be considered for determining the security model that should be adopted by the businesses
• Describe the business and what it does
• Define activities that support business
• Identify information required by the above activities
• Classify information sensitivity
• Identify those who need access to the information
• Identify impact for applicable laws
• Identify and evaluate risks and actions to be taken
Everyone needs to be involved and know the need for security, Hence these steps are to be followed in implementing Information Security
• Designate who is responsible for managing security
• Secure your physical location
• Set up secure storage space
• Get employees to sign non-disclosure agreements
• Install network security components
REFERENCE:
Ward B, (2010). Available on youtube, Retrieved on 07 March, 2014 from

MY REFLECTION ON ADVANCED PERSISTENT CYBER THREATS IN ORGANIZATIONS

Posted on Updated on

No matter the size of an organization whether large or SMEs, advanced cyber-attacks such as Advanced Persistent Threats, represent a credible threat and risk to the organization and Information Security officers  must address the risk these adversaries pose to their organization.

A four-step process for countering advanced cyber attack which is a big Information Security Challenge is provided below by The CISO’s Guide to Advanced Attackers (2012).

  • Gather intelligence
  • Mine for cyber threat indicators
  • Respond to information security alerts
  • Break the “kill chain” or cyber-attack process

 I posit that beyond the Financial Incapacitation challenge that has been identified as a major reason for SMEs not being able to tackle IS issues, corrective measures like the above listed should be adopted instead of focusing on the assumed complexities. 

REFERENCE:

The CISO’s Guide to Advanced Attackers (2012). Retrieved on 05 March, 2014 from < http://go.secureworks.com/lp-ciso-guide-advanced-attackers>.

MY REFLECTION ON SUPPLY CHAIN MANAGEMENT AND CUSTOMER RELATIONSHIP MGT.

Video Posted on Updated on

My point here basically is that we should take into consideration CRM as it is a very interesting field where we learn how to relate with the most complex entity which is human being.

MY REFLECTION ON SOCIOTECHNICAL SYSTEMS

Video Posted on Updated on

This video is basically what i gained from Dr. Marie’s class on Friday, 31st Jan 2014 on the improvement of existing Socio technical Systems Design or whether to design new systems that will be void of the challenges of the present.

Susan Cole’s Reflective video on Digital Identity

Posted on Updated on

This video reflects three out of the many things I gained from the topic DIGITAL IDENTITY during the lecture sessions on the 29th of January. The 3 things are:

  1. Ability to think wide on the subject topic wearing the different thinking hats postulated  by Dr. Edward de Bono. Not physical hats though but thinking from different perspectives on the same topic
  2. Ability to blog use word press
  3. Interpersonal relationship skills. This was not taught directly but i learnt it by the simple act of working in teams, sharing ideas and views.

My reflection on the problems of Digital Identity

Posted on Updated on

Being cyber street wise is a serious issue that requires attention especially now that there is the problem of Identification in cyberspace. The issue of knowing the person one is interacting with has been generating problems of late as there are little or no ways to exactly determine an individual’s identity in digital space. Even though there are attributes associated to a person’s digital identity, these attributes or even identities can be and are often changed, masked or dumped and new ones created. Despite the fact that there are many authentication systems and digital identifiers that try to address these problems, there is still a need for a unified and verified identification system. Thus, the need to address issues of privacy and security relating to digital identity.

Reference- Cole, S.A. (2014). A reflection of my thought on Digital Identity from the social media point of view. The Mind Press