Free Essay

Infinite

In: Business and Management

Submitted By wardalicious
Words 1244
Pages 5
Technical security officer: responsible for the configuration, design, deployment and maintenance of information security program, including policies, procedures, technical systems, and workforce training in order to maintain the confidentiality, integrity, and availability of data within the company.

ABOUT ETIHAD: founded on 2003, based on Abu Dhabi. Slogan: “from AD to the world”. Etihad Airways is the 4th largest airline in the Middle East and 2nd largest airline in the UAE, after Emirates airlines….James Hogan Chief Executive Officer on 2006…sponsored many sports events such as rugby and formula 1 Abu Dhabi Grand Prix.…..received many awards such as “Best First Class", "Best First Class Seats" and "Best First Class Catering"
2010 opened route from AD to Seoul….Last week sign agreement with Korean air…
#1) What attracted you to the field of Information Security?
#2) What brings you to us?
#3) Do you pursue any information security research outside of your current employer?
I like to see candidates who enthusiastically brag about their test lab at home, or what they have recently done at an Information Security conference or convention. I want people on my team who take pride in their work, not a ticket pusher who is just in it to close as many tickets as possible and go home.
#4) Why would you like to work in this position?
- To help the organization succeed with their achievements by securing their confidentialities and ease to communicate with outsiders.
#5) How did you find out about this job?
#7) How do you keep up to date with new information security risks and threats?
- newspapers, online news, social media, people, news channels
#13) What are your strengths in this position?
This is a standard question designed to highlight where the candidate sees himself strongest.
#15) What has been your most important work-related idea?
- promoting security company like aecert to students during security week @ uni
- green technology
- conduct short security quiz to non-IT students & faculty & informing the importance of IT security
- conduct a cleaning policy, security games and broadcasting IT news in GASCO

Latest cyber security attack was in Saudi Aramco…by a virus called Shamoon…said to be attacked by Iran…the virus attacks only oil & gas companies and exploit through shared hard drives like USB…the virus compiles a list of files, erases imp files and send sensitive info back to the attacker and finally overwrites the booting system. The company has to shutdown their network, disabling employees’ e-mail and Internet access, to stop the virus from spreading.

SSL certificate (secure socket layer): a small file that has a cryptographic key and when installed on a web server, it activates a padlock and HTTPS protocol….used in secure credit card transactions, data transfer and logins, and securing social media sites

FTP (file transfer protocol): standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet.

OSI (Open Systems Interconnection): conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers 7 layers. A layer serves the layer above it and is served by the layer below it.

1. Physical >>> 2. data link >>> 3. network >>> 4. transport >>> 5. session >>> 6. presentation >>> 7. Application

symmetric key: a class of algorithms that use the same cryptographic keys for both encryption and decryption that both sender and receiver can use to maintain a private information link therefore it’s one of the drawbacks.

asymmetric key: algorithms that use two keys - a public key to encrypt messages and can be distributed in a non-secure way, and a private key to decrypt them which is never transmitted.

http (Hypertext Transfer Protocol): networking/application protocol

HTML (HyperText Markup Language): markup language

Hub: used on LAN where packets/message are sent out to everyone in the network and it is up to the receiving party to decide if it is of interest. Since every packet is sent out to every computer on the network, there is a lot of wasted transmission thus cause the network to malfunction. Physical layer…layer 1

Bridge: it looks at the destination address of the packet and if it is similar to the address on the other side of the bridge before sending. If the address is not the same, the bridge will not transmit the data. Bridges are typically used to separate parts of a network that do not need to communicate regularly, but still need to be connected. Data link layer…layer 2

Switch: has multiple ports. When a packet comes through a switch it reads the MAC address to determine which computer to send the data to specifically. Most large networks use switches rather than hubs to connect computers within the same subnet. Data link layer…layer 2

Router: same as switches but reads IP address instead of MAC address. The most common home use for routers is to share a broadband internet connection. Network layer…layer 3

Proxy: proxy servers basically hide your internal network from the Internet. It works as a firewall in the sense that it blocks your network from being exposed to the Internet by redirecting Web requests when necessary.

Firewall: Firewalls can block ports and programs that try to gain unauthorized access to your computer

UDP (User Datagram Protocol): connectionless protocol which means you won’t know if it reaches its destination or not. Transfers messages quickly in no order. Doesn’t do error checking nor ha ACK segments. Eg: VoIP, movies, online games

TCP (Transmission Control Protocol): connection-oriented protocol. Transfer messages slowly in the same order as it was transferred but if it doesn’t come in order, resend is required which takes time. It does error checking and has ACK segments. Eg: www, email, FTP

Subnet: logical grouping of connected network devices. Which means grouping devices that have the same IP addresses prefix and thus improve network security and performance.

Encryption: Encryption transforms data into another format in such a way that only specific individual can reverse the transformation. Maintains data confidentiality and requires the use of a private key in order to return to plaintext.

Hashing: producing strong evidence that a given message has not been modified by taking a given input, hashing it, and then encrypting the sent hash with the recipient's public key. When the recipient opens the message with their private key they then hash the message themselves and compare it to the hash that was given encrypted by the sender. If they match it is an unmodified message.

SMTP (Simple Mail Transfer Protocol): SMTP is used when email is delivered from an email client, such as Outlook Express, to an email server.

POP3 (Post Office Protocol): allows an email client to download an email from an email server.

Port numbers: http port 80, SMTP port 25, POP3 port 110, FTP port 21

NAT (network address translation) and how does it work? process of modifying IP address information in IPv4 headers while in transit across a traffic routing device

What is ISO 27001 and why should a company adopt it: a management system that is intended to bring information security under explicit management control. It includes: Security policy, Asset management, Access control, Business continuity management etc.

What to do when a virus struck a system and how to fix it? Disconnect the net from your computer, scan & quarantine your PC using the latest antivirus. Make sure to always backup your files.

Similar Documents

Premium Essay

Infinite

...8. Comment on the dividend policy debate at New Wave Corporation. In your opinion should they pay dividend at all? Why or why not? If they decide to pay dividends, what kind of dividends policy should they adopt? Explain. From this case, there are many debates about dividend policy in New Wave Corporation. Joe Smolinski thinks they should continue retaining all their earnings and use the money for future investment rather than consider paying dividends first. Jim Baker thinks they should consider to pay dividends, he said they should identify their existing shareholder groups and make a decision based on what the majority prefers because shareholders have waited a long time for dividend. Bob McKay thinks they should use residual dividend approach And Edwin thinks they should figure out how much they can afford to pay out based on their immediate investment needs and target capital structure and then repurchase stock at the prevailing market price with what’s left over. At our opinion, we think they should think better of the dividends policy. Because shareholders have waited a long time for dividend, if they insist on don’t paying dividends, the company’s credit will decrease. We think they have to pay dividends to shareholders. By giving them dividends, the company’s credit will increase, and it can prevent shareholders sell their own stocks. It is a better way to use residual dividend policy, that way they can keep their shareholders happy and maintain their target capital...

Words: 258 - Pages: 2

Free Essay

Infinite Conferencing

...DeAndre Adams Ms. Jones Business Communication 02-10-14 Infinite Conferencing Video conferencing is a two-way, real-time transmission of audio and video signals between specialized devices at two computers over the internet. The development of video conferencing started back in 1956 with AT&T building their first picture phone testing system. Years after in 1991 the first video/audio conference was held. Founded in 2001, Infinite Conferencing has become one of the best web conferencing services in the industry. It has the ability to boasts a large number of participants over its competitors. With Infinite conferencing you have the ability to serve up to 1,000 viewers at a given time. Small companies may not ever need the access for anywhere nears that number of participants, but by accommodating large online conferences, Infinite Conferencing shows that their features are above average. Supporting 1,000 participants could cause problems audio wise for some but be not Infinite Conferencing. They have a feature called Full Duplex Audio Support; this feature allows you to be able to hear each other speak during the web conference without having to wait for each other. No more choppy conversations or audios. This virtual meeting service is loaded with features that range from helpful IT support to easy-to-read reports for every meeting. With Infinite Conferencing you can get a solution tailored to your specific needs, technical support that is top-notch and available...

Words: 443 - Pages: 2

Free Essay

Adventures in Cheating

...Adventures in Cheating A guide to buying term papers online. Students, your semester is almost over. This fall, did you find yourself pulling many bong hits but few all-nighters? Absorbing much Schlitz but little Nietzsche? Attending Arizona State University? If the answer is yes to any or (especially) all these questions, you will no doubt be plagiarizing your term papers. Good for you—we're all short on time these days. Yes, it's ethically blah blah blah to cheat on a term paper blah. The question is: How do you do it right? For example, the chump move is to find some library book and copy big hunks out of it. No good: You still have to walk to the library, find a decent book, and link the hunks together with your own awful prose. Instead, why not just click on a term paper Web site and buy the whole damn paper already written by some smart dude? Que bella! Ah, but which site? I shopped at several online term paper stores to determine where best to spend your cheating dollar. After selecting papers on topics in history, psychology, and biology, I had each paper graded by one of my judges. These were: Slate writer David Greenberg, who teaches history at Columbia; my dad, who teaches psychology at the University of Rhode Island (sometimes smeared as the ASU of the East); and my girlfriend, who was a teaching assistant in biology at Duke (where she says cheating was quite common). So, which site wins for the best combination of price and paper quality? I compared free...

Words: 1732 - Pages: 7

Free Essay

Infinite Love

...We met at a cancer patients' support group at our church. I have lung cancer and have had it for as long as I remember. I had been attending for about a month when I met him. At first I didn’t really know anyone, but quickly I became friends with Dave, who like me, suffered from lung cancer. Dave had been attending cancer patients' support group for a very long time and he was the one who introduced me to Charlie. I first met Charlie on a Thursday. I clearly remember the day. It was raining and I was just about to leave support group and walk out into the parking space, when Dave shouted out my name. I had seen Charlie at the meetings, but I had never spoken with him though - he was very shy, compared to Dave who is a very extrovert person. I went over to them and Dave introduced me to Charlie. We shook hands and I felt this weird connection right away. I didn’t get his number, so we didn’t talk until the next support group meeting. I had never been looking forward to support group meetings. I had always wanted to skip the meetings and lay in bed instead, but this time I was really looking forward to support group, I could barely wait. And that was mainly because I wanted to see Charlie again. But he didn’t show up for the next meeting. I sat next to Dave, but I didn’t want to ask him about Charlie. I didn’t want him to know I was interested. When support group was over, I went out into the parking space like I used to and there he was. I didn’t know what to do, but fortunately...

Words: 426 - Pages: 2

Premium Essay

Commencement Speech: This Is Water By David Foster Wallace

...never fail to make the audience roll their eyes. In the vast sea of mediocre commencement speeches, only a few stray from the typical commencement speech formula and are considered exceptional. One of these notable commencement speeches is “This is Water” by David Foster Wallace. In his 2005 commencement speech to Kenyon College, David Foster Wallace’s makes a complete one-eighty from the typical commencement speech; discussing complex topics that were all too vital to the baby-faced, liberal arts graduates. He tackled the issues of human selfishness, default behavior, worship, truth of freedom, and awareness of our surroundings. Wallace’s background as a writer is crucial to understanding these themes. After the success of his novel Infinite Jest, Wallace became known as one of the most influential writers of modern times. Postmodernism, the genre of writing which he is known for, is defined by its criticism, skepticism, irony, and distrust of typical narratives and honest ideals of the work that preceded it. Likewise, This is Water shares this same theme of self-awareness which is so prevalent in the postmodernism. To start with, Wallace tells a story about a two fish swimming along who pass an older fish. When the older fish ask the two fish “How’s the water”, one of them responds with “What the hell is water?” The story itself reminds the audience that we are often unaware of our surroundings. The story also succeeds in introducing the main theme of his speech —Self awareness...

Words: 1004 - Pages: 5

Premium Essay

Foundationalism and the Infinite Regress

...Topic: In your considered (and informed) opinion, does foundationalism adequately address “the Problem of infinite regress” with respect to justification? Then follow this up by presenting your answer to this question in the form of a well composed argument for your reader in support of your conclusion. Renee Descartes was born to Joachim Descartes and Jeanne Brochard on March 31st 1596 in La Haye, France he was first credited with being “the father of Modern Philosophy”. Throughout Descartes years of study he was plague by the decision to question how much of his knowledge were true and how much were false. He set out to establish a system of knowledge on a foundation of beliefs whose truth could not be doubted. Descartes basic strategy was to consider anything false that present even the slightest doubt. This form of doubt is called the “hyperbolic doubt” and serves to clear the way for what Descartes considers as the unprejudiced truth. It was from this point that Descartes sets out in search for what lies beyond all doubts. Throughout this philosophy essay I will divulge more into what foundationalism is and how it attempts to address the problem of the infinite regress with respect to justification. Foundationalism has a long history; some view it as a structure of justification that we consider as a factor of what we take for granted based on knowledge. Foundationalism can also be defined as the search for the first cause; the search for beliefs that can serve...

Words: 1506 - Pages: 7

Free Essay

Acc Python Lab 9

...Algorithm High Card prompt for the name of player 1 and player 2 initialize two card objects and call the .deal() method print to the players to show what card by calling .get_face_value() on the card objects display the result (if card 1 > card 2 display player1 won else if card 2 > card1 display player 2 won, else display tie) Face_value if card is 1 display ace if card is 2 display two if card is 3 display three if card is 4 display four if card is 5 display five if card is 6 display six if card is 7 display seven if card is 8 display eight if card is 9 display nine if card is 10 display ten if card is 11 display jack if card is 12 display queen if card is 13 display king make change prompts user for the cost of the item prompts user for the amount tendered determines how much change if any is returned to the customer by subtracting amount tendered by the cost of the item prints 'customer still owes money' if the amount tendered is not greater than or equal to the amount owed prints the change in the amount of dollar bills, quarters, dimes, nickels and pennies owed back to the customer deal hand creates 5 card objects and gives them values with the .deal() method puts the 5 Card objects in a list calls the method display_hand() to display the face value of each card in the list calls the method hand_stats() to give the stats of the hand such as: the highest/lowest card and the total/average value of the cards menu prints the menu and prompts...

Words: 1265 - Pages: 6

Premium Essay

The Infinite Sea Theme

...1. The protagonist in the book “The Infinite sea” by Rick Yancey, is Cassie a girl who is trying to protect her little brother and friends against the aliens that have invaded earth . The antagonist are the aliens that come to the world and take over. They kill or take over everyone in sight. 2. The story takes place on earth in a small town where Cassie and her family have lived since she was born. It’s kind of a small house for a family of six. It has four bedrooms but only two bathrooms they always struggle to share but they manage .This is nothing compared to what happens later in the book, which causes them to travel over one hundred miles on foot and causes them to split and lose the one’s they love . 3. The story starts off with the early winter killing all the crops and causing there to be no harvest. Then as the book goes on the aliens come. The day starts out as a normal...

Words: 607 - Pages: 3

Free Essay

Dc Comics

...Oral Roberts University SUPERIORITY AND BLURRED LINES: An observation of the themes communicated in major DC Comics storylines Joshua Gallego Philosophy of Science HONR 102 Dr. Ken Weed/Dr. Samuel Thorpe March 13, 2014 Introduction Superheroes are part of an American upbringing. Stories of persons with capabilities that far exceed that of the human race are popular and appealing to our youth and even to many adults. Entertainment in general pervades the American culture, and this specific type of entertainment dealing with superheroes is of considerable size and has been a constant for several decades. Images of Superman, Captain America and many others are immediately recognized when seen. The entertainment value of these fictitious tales has caused the companies that own them to expand into creating computer games and producing movies, which has made them even more visible. It is considered weird if a person does not even know the basic story of these costumed figures. The adventures, stories, and even lives of these fictions have become a part of the American Psyche. Throughout the course of this semester, discussion in the Philosophy of Science class has led to topics such as the paradigms and presuppositions that we approach our world from and the metaphors that we use to communicate ideas and concepts. Such discussion has led to the asking of questions concerning things that we encounter in everyday circumstances. Questions like “What are the presuppositions...

Words: 3545 - Pages: 15

Free Essay

Predictions for the Future of the Dc Universe

...My Prediction for Season 2 flash story line includes Futures end influences and a Wally West Flash! Here is how I have come to that conclusion and then some. In Tuesday night's episode of The Flash during the body snatcher scene Eobard says to Harrison; "In the year twenty twenty (five years from now) you and your wife Tes Morgan successfully launch a particle accelerator that changes the course of history". Eobard accelerated that timeline, to the year 2015 (technically 2014, and they should have had the line read 2019). Five years from now, the DC Comic Universe plot line for Futures End is as follows: "Reeling from a war with Another Earth, leaving the world unprepared for an approaching evil that threatens to destroy the future can a time traveling Batman (beyond)." Now simply begin to replace batman with "Can a time-traveling Barry Allen, help a massive cast of the DCU’s finest avert the impending apocalypse caused by the changes to the timeline Eobard Thawn the Reverse Flash set in motion after the eventual survival of Barry's mother? That means season two should be getting heavy doses of influence from the Futures End storyline. For the new as-yet-unnamed show, they are casting characters like HawkGirl, so this gives some credibility to a "massive cast" I digress, now since Harrison wells and Tess Morgan will be the cause of the S.T.A.R. labs explosion in 2020, we should see some new superheroes from older cast members, like Cisco becoming Vibe and Mrs. Katlin snow becoming...

Words: 460 - Pages: 2

Premium Essay

Infinite Regress and the Cosmological Argument

...INFINITE REGRESS AND THE COSMOLOGICAL ARGUMENT I n recent years, there has been a revival of interest in that version o f the Cosmological Proof for God's existence which argues for the n ecessity of an uncaused or first cause. The argument can be p resented as follows: I ) We know that at least some things are caused to come i nto being 2) Either whatever causes something to come into being has i tself been caused to come into being or there is somet hing that causes something to come into being which has n ot itself been caused to come into being 3) But if whatever causes something to come into being has i tself been caused to come into being, there is an infinite series of causes stretching back in time 4) But there cannot be such a series 5) Hence there is something that causes something to come i nto being which has not itself been caused to come into b eing. T h a t is, there is an uncaused cause, and this is G od. N ow the major source of disagreement between the defenders and o pponents of this argument is over whether premise (4) is true, i.e. w hether an infinite series of causes stretching back in time is possible. A n umber of fallacious objections to the possibility of an infinite series have been exposed, 1 but there remains one objection that h as not, and in the opinion of several supporters of the argument, c annot be answered. This is essentially that if there were an infinite series of causes stretching back in time, in order to reach...

Words: 333 - Pages: 2

Premium Essay

Infinite Crossings Argumentative Essay

...The South DeKalb, Georgia, community of Belvedere Park has had a number of cases over the years involving gun violence along Glenwood Road: two DeKalb County Police Officers ambushed and murdered, another set of DeKalb County Police Officers injured in a shooting, a teenage male shot and killed, and just recently an infant child shot along with three other victims and more. Due to the alleged cases of police brutality occurring around the country with African-Americans, many Americans are a part of the "Black Lives Matter" movement, but when does Black lives matter? Only when it’s a matter of dealing with the police and/or when someone from outside of the African-American community commits the murder? Infinite Crossings, a grassroots organization based in the Belvedere Park community is working on an initiative to improve the lifestyles of low income and working class residents of Belvedere Park. Currently we are focused on addressing the issues of poverty,...

Words: 494 - Pages: 2

Premium Essay

Algebra Of Infinite Justice Analysis

...Economic sanctions are more commonly being used to try and satisfy a wide range of foreign policies that America had deemed necessary to achieve for the betterment of society. Yet time after time these sanctions are only hurting innocent civilians that are not at fault, and in fact are not even achieving what they were supposed to do. In Arundhati Roy’s essay “The Algebra of Infinite Justice”, Roy critiques the statement given by former U.S. ambassador Madeleine Albright. When Madeleine is asked the question “How she felt about the fact that 500,000 Iraqi children have died as a result of economic sanctions the U.S. insisted upon” she replied with “it was a very hard choice, but all things considered, we think the price is worth it” (306). Roy then goes on to say that these sanctions are “massacres of innocent people” and that they cause for “collateral damage” (306). Superpowers such as the United States are imposing economic sanctions that are only in the best interest of the people of America and have no regard to the implications that these sanctions come with. Therefore, economic sanctions should not be imposed on nations because they directly impact ordinary civilians and...

Words: 1163 - Pages: 5

Premium Essay

Rick Yancey's The Infinite Sea

..."The Infinite Sea" by Rick Yancey is a science fiction novel intended for a young adult audience. It follows a group of teenagers and children, especially protagonists Cassie and Ringer, as they adapt to and survive in a post-apocalyptic world threatened by alien entities intent on squashing humanity. Overcoming their fears, the characters face each new challenge with bravery and purpose as they define what it means to be human. Ringer leaves her group at Walker Hotel as she sets out in search of a new hideout, but when she is followed, she shoots her pursuer who turns out to be her young friend, Teacup. Evaluating the risks as the enemy approaches, Ringer decides against abandoning or killing Teacup. While Cassie and Sam struggle with their father's death, Teacup sneaks off to follow Ringer, and Poundcake follows to retrieve her. When Dumbo disappears as well, Cassie and Zombie search for the intruder who...

Words: 555 - Pages: 3

Free Essay

Eigrp

...Lockett, Roblee Page 1 of 48 6/3/2003 GENETIC ALGORITHM BASED DESIGN AND IMPLEMENTATION OF MULTIPLIERLESS TWODIMENSIONAL IMAGE FILTERS by Douglas J. Lockett and Christopher D. Roblee ********* Senior Capstone Design Project Submitted in partial fulfillment of the requirements for the degree of Bachelor of Science Department of Electrical and Computer Engineering Union College Steinmetz Hall Schenectady, New York 12308 U.S.A. Submitted May 30, 2003 Final Project Report Senior Capstone Design Project, Department of Electrical and Computer Engineering Union College, 2003. © 2003 Douglas Lockett, Christopher Roblee Lockett, Roblee Page 2 of 48 6/3/2003 Table of Contents: Abstract……………………………………………………………………………….3 1. Introduction…………………………………………………………………………..4 2. Theory of Multiplierless Arithmetic………………………………………………...5 3. Image Filters 3.1. Motivations for IIR vs. FIR……………………………………………………....7 3.2. Edge Detection …………………………………………………………………..8 3.3. Canny Edge Detection……………………………………………………………9 4. Genetic Algorithms 4.1. Motivations……………………………………………………………………...10 4.2. Basic Theory…………………………………………………………………….10 4.3. Description of the Designed Genetic Algorithm………………………………..13 4.3.1. Fitness Function Definition and Crossover Selection…………………...17 4.3.2. Magnitude Response and Relative Error………………………………...19 4.3.3. GA Parameters…………………………………………………………...19 5. Results 5.1. Magnitude Frequency Analysis ……………………………………………...…21 5.2. Spatial Analysis…………………………………………………………………24...

Words: 9389 - Pages: 38