Maintenance is an essential task that is often considered to be dull. In information security, penetration testing may be wrongly perceived as being a “hacker-like” activity. In fact, when done correctly, ethical hacking is an important part of risk management. …

How can penetration analysts work under very restrictive rules of engagement when testing systems? Read more »

The theories of change management (based on the Lewin model) add insight to how users deal with change. How would you deal with change? The Lewin Model consists of three stages. First is unfreeze, meaning decreasing resistance to change and …

The theories of change management (based on the Lewin model) add insight to how users deal with change. Read more »

Suppose you started working as a network manager at a medium-sized firm with an Internet presence, and discovered that the previous network manager had done a terrible job of network security. Which four security controls would be your first priority? …

Which four security controls would be your first priority? Why? Read more »

There are many different organizations working on their vision of a high-speed Internet. Is this a good or bad? Would we be better off just having one organization working on this and coordination the work? Please discuss with your classmates. …

There are many different organizations working on their vision of a high-speed Internet. Is this a good or bad? Read more »

What is the future of PKI? Acceptance of PKI solutions—and product sales—has fallen short of early estimates. What would the “killer app” for PKI sales look like? Though a temporary drop has been observed in the acceptance of PKI solutions, …

What is the future of PKI? Acceptance of PKI solutions—and product sales—has fallen short of early estimates. Read more »

A recent topic of interest in the industry is the Intrusion Prevention System (IPS). Many vendors have created enhancements to IDS systems to make them into IPSs. Look into current developments in this area.  What did you find of interest?  …

A recent topic of interest in the industry is the Intrusion Prevention System (IPS). Read more »

Which architecture for deploying a firewall is most commonly used in businesses today? Why? In depends on some variables. For example what is the objective of the established network, the actual capacity of the firm that would be developing and …

Which architecture for deploying a firewall is most commonly used in businesses today? Why? Read more »

Why is it so important for companies to have policies when it comes to information security? How can a company develop some policies if they do not have any? Where can they go to gather information? It is extremely important …

Why is it so important for companies to have policies when it comes to information security? Read more »