Auditing Organisational Information Systems – Security

Auditing an organisation?s information systems is a vital part of operating a business at any decent scale. Particularly from a security standpoint (Mohamed ElBorno, n.d.). Information systems have many different facets and each organisation operates slightly differently, so while auditing can be handled the same on general shared traits, more bespoke business units and organisational structures should be taken into account when designing a well thought out auditing system that fully guarantees the security of an organisation?

Biometric Technology

What is Biometric Technology? Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits (Margaret Rouse, n.d.) Such recognition usually falls into one of the main categories such as: Facial recognition Hand geometry Earlobe geometry Signature comparison Voice waveform recognition Iris-pattern and Retina-pattern recognition Fingerprint recognition The above are the verification patterns which various technologies are built around in order to create working application use cases for larger security concerns.

Copyright Compensation in the Internet Age

The original conception of copyright in 1710 (Craig Joyce, n.d.) was that it usually covers only the expression of a particular idea and not the idea itself, but this was a very long time ago, before the challenges of a digital society. Since then, copyright has had to encompass a wide variety of extended property far removed from it?s original case studies that were available at the time. In the Internet Age, digital items such as music, video (films, series, etc.

Controlling employee digital access

Organisations of all sizes have taken to controlling what their employees can access in order to conserve computing resources, keep their employees focused 100 percent on the work they were hired to do and to make sure employees performance is high and as productive as possible (Cyberoam, n.d.). However, keeping employees motivated and productive is not as simple as simply restricting specific access to internet resources and computer controls. There are many advantages and disadvantages when it comes to controlling said access (CCM, 2017).

Electronic monitoring in the workplace

Electronic monitoring is not a new thing, nor one that only affects the workplace. From closed circuit television (CCTV) in stores and down many streets, to similar surveillance in offices everywhere, we are constantly being monitored in all aspects of our lives. Why and how employers are monitoring employees Many employers and organisations tend to perform similar tactics when it comes to monitoring (Emma Anderson, 2014), but I would like to focus on my current and previous employer in order to draw a common ground and paint a picture as to where and how we as employees are being electronically monitored.

The Therac-25 Case Study – What Actually Happened?

The Therac-25 was a computerised medical technology radiation therapy machine produced by Atomic Energy of Canada Limited (AECL) in 1982. Between 1985 and 1987, it was involved in at least six patients deaths due to incorrect radiation doses because of computer software related failure. When the error was first seen, it was thought to be a hardware problem with the microswitches. After further inspection and deeper technical analysis; the problem was due to a software bug where a Race-Condition – which is an undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time but the operations must be done in the proper sequence to be done correctly.

Your Responsibilities as an IT Professional

As an IT professional it is extremely important to make sure that you do not take advantage of your position on being able to introduce certain skewed characteristics into a computing system in order to gain unfair advantage to your company or client?s business. This is seen as unethical and in many cases can also be illegal. Your professional responsibilities are: Role The person assigned a task is considered the responsible one (Illinois Ideals, n.

New capabilities with technology

Computing technology has undoubtedly had some very prominent impact on society at large. Of the almost countless capabilities that it has brought us, the following five core capabilities are without a doubt at the top of any compiled list on the subject: Ever increasing speed Unlimited storage potential Lack of human error Global connectivity Auditability Being able to store an unlimited amount of data is one of the main capabilities that we will expand upon and explore in a bit more detail as it provides innumerable offsprings into technological advancements and data insights generally for a wide range of applications and technologies in almost all sub-industries.

The Printing Press – Technology’s impact on society

It’s important to first define what the term “technology” means. Technology is “the application of scientific knowledge for practical purposes, especially in industry.” (Oxford Dictionary, n.d.) The term is not reserved for computing systems, but for any field of engineering or applied sciences. The printing press has been one of the most important inventions in history and would definitely classify as being within the top few technological enhancements of all time.

Google Abuses Search Dominance in the European Union

The EU Commission found that Google has been favouring their very own shopping service while demoting those of their rivals as well as the placement of how they are seen in search results online. This is favoritism or preferential treatment which makes it unethical, regardless of sustainability thereof. This is a negative thing as a world-wide monopoly of this magnitude should not be allowed to occur at all. It means that a single organisation can and will continue to gain more power by pushing their own products and services above those of others.

Understanding the Risks of Commercial off-the-shelf software (COTS)

Commercial off-the-shelf (COTS) software can be an attractive buy in for many companies when it comes to: Purchasing an already made final software solution. Purchasing a solution that is tried, tested and trusted in the industry already. Not wanting to get a development team in to build a bespoke solution. Not wanting to manage a greenfields software development project. It can seem very attractive at first to jump into a COTS solution, but there are many things to take into account that can make it a less than ideal option.

Identifying Risks in Software Engineering

In Software Engineering it is absolutely paramount to identify all risks that may arise in a given project or grouping of tasks. Without doing the aforementioned, a project can quickly unravel and become disjointed and inherently fall apart. It is very important to be able to identify risks and act on them appropriately and in a timely manner (Pressman,1997). Among the many risks that are most common and obvious in Software Engineering, I have decided to showcase three in particular that I have found to be imperative in noticing and foreseeing the looming signs of project degradation and failure.

Software engineering challenges in the 21st century

Software Engineering covers not only the technical aspects of building software systems, but also management issues, such as directing programming teams, scheduling, and budgeting. (Webopedia, n.d.) The world of software has exploded since it’s humble beginnings in the mid 1940’s. Over the next 30 years the industry focused primarily on cost effective hardware manufacturing and software was undertaken as a second measure, but there were no real methodologies to creating robust, reusable software components.

Computer Memory – The Breakdown

Storage devices have come a long way in an extremely short amount of time; given how much they have changed from just my personal knowledge alone. I still remember using an IBM PC XT 286 with 640KB of RAM and a 64KB ROM to using services provided by companies over the past few years such as Backblaze who are building out 60 Drive 480TB Storage Servers accessible from anywhere. There are two primary types of storage topologies.

Current Trends in Computing

The American multinational technology company Yahoo, which has been around since the mid nineties has once again been hacked. This time it is more serious than ever before and a total of around one billion accounts have been identified in the biggest known breach in history as gleaned by The Guardian, Aljazeera, CNBC and numerous other sources. This particular event has contributed towards the overall security risks evident in storing your information on another corporation’s network.

Academic integrity in a cultural context

In academia it is vitally important to backup your own thoughts and ideas by using previously written authoritative papers and articles in reference. This helps provide you more credibility as well as proof of what you’re saying actually makes sense and falls in line with previous extensive research that has been done on the subject. It also helps to build upon others so as to not have to “reinvent the wheel” each and every time.

How to get more traffic to your blog

If there’s only one thing that keeps website owners up at night, it’s thinking about the next wave of traffic that they aren’t yet getting. Without decent amounts of traffic your website isn’t really doing all that much – regardless of what fantastic theme or design you may think you have. and gain a more popular website bustling with loads of daily visitors** ** Social Networks The obvious method to get more visitors is to go to where everyone else on the internet is most of the time.

How big is Amazon S3 really?

Amazon’s Simple Storage Service, or simply S3 for short, is a product designed for storing objects (or files are most people know them) in their proprietary cloud hosting (AWS). Since S3 was first released on March 14th of 2006, it has gained amazing amounts of popularity online, particularly from web and software developers. It’s quite interesting to know what S3 really is under the hood and how large it has become.

3 Things you should be tracking with your analytics software

What should we be tracking? This is a question we get asked quite a often – mainly by new customers as well as people who aren’t certain if what they’re looking at adds any value to their daily business time usage. If you’ve ever used an analytics tool, you will identify with how addictive it can be to watch the traffic coming in, see where everyone visitor is from and what they are looking at as it happens in realtime.