Chris's CIS 608 Blog
Sunday, November 16, 2014
Blog in Retrospect
›
For my blog this semester I intended to stick to a basic pattern of providing relevant information to any interested persons based on wh...
Who to call for cybercrime
›
After discussing and researching laws pertaining to cyber crime this week I wanted to dive a little deeper on what an individual can do to ...
Sunday, November 2, 2014
Personal Use Biometrics
›
I don’t store sensitive personal information on my phone. If my phone were to be compromised my loss would be the cost of the device ...
Sunday, October 19, 2014
Why Risk Analysis
›
I like to browse the internet before posting on here in an attempt to relate the week’s lessons to current trends in Cyber Security. Th...
Sunday, October 12, 2014
Information Security Metrics Conundrum
›
Me: “My patch compliance is at 99.75% and my user education percentage is 100.” CEO: “Wonderful, but we just got taken for 18 mi...
Sunday, October 5, 2014
JP Morgan Attacked, User Attacks Pending
›
Seems like every week there is a cyber attack in the headlines. This week it is the compromise of 83 million customer records from JP Morga...
Sunday, September 28, 2014
›
For this week's assignment I wrote an issue specific security policy regarding home network use. Actually brainstorming items that shou...
›
Home
View web version