The most pervasive means of communication today for businesses and private citizens, Electronic mail or Email, was not designed with security in mind. Today, Email application is built into almost all smart devices from phones to computers to gaming and sensor devices. however, the Email message that this device send and receive is transmitted in plain text format in almost all cases. with ever-increasing cybercrime, sending plain text message that can potentially contain sensitive data is a risky undertaking. This weakness in security in Email systems, has made Email the primary attack vector for criminals. Cybercriminals use Email as simplest and cheapest method to ship their malicious payload to targets. The three core principles when it comes to information security, Confidentiality, Integrity and Availability (CIA) holds true in Email security as well. However, there is one other principle to consider in Email security, Non-repudiation meaning that the sender of the Continue reading
Information Systems Management
Data Mining – Meaning, Processes and Models
Data mining involves the use of sophisticated data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. These tools can include statistical models, mathematical algorithms, and machine learning methods such as neural networks or decision trees. Consequently, data mining consists of more than collecting and managing data, it also includes analysis and prediction. The objective of data mining is to identify valid, novel, potentially useful, and understandable correlations and patterns in existing data. Finding useful patterns in data is known by different names (e.g., knowledge extraction, information discovery, information harvesting, data archaeology, and data pattern processing). The term “data mining” is primarily used by statisticians, database researchers, and the business communities. The term KDD (Knowledge Discovery in Databases) refers to the overall process of discovering useful knowledge from data, where data mining is a particular step in this process. The steps in the KDD process, Continue reading
Advertising in the Ubiquitous Age
Ubiquitous computing, which is also referred to as pervasive computing, is about the notion that as a result of continuous advances in engineering, information technology, communications, integrated circuit chip technologies and sensors etc. computer technology devices will become smaller, cheaper, more capable and better able to weave themselves into the fabric of everyday life until they become indistinguishable from it. It was Mark Weiser, chief scientist of Xerox’s Palo Alto Research Centre, who first presented the concept of ubiquitous computing, the third wave in computing and predicted that technology will recede into the background of our lives as computers evolve into quite, invisible servants that will help people to calmly do all kinds of tasks in a manner that will prevent them from becoming overloaded by interactions with computing. Thus, computers will extend the human unconscious and enhance their ability to productively control, interact and sense their environment. Unlike the Continue reading
Cybersecurity – Best Practices to Protect Business Organizations
In any organization, there are set duties, assignments and responsibilities to accomplish department goals, targeted objectives, and outcomes. Employees at every level within a business organization should take their responsibilities about Cybersecurity very seriously and be part of the organization Cybersecurity focus. Every department under the business structure should know what their part within the organization cybersecurity program. Every one, though matter what department they belong to should work as a team to meet and exceed the organization cybersecurity goals. Having a great cybersecurity program is the responsibility of management and it should be a part of every facet in all sectors of the business. In every organization with an IT department, the IT department is the regulator of the business cybersecurity program. They create the policy, in accordance with the business goals, mission, and objectives. They build, implement and monitor the organization cybersecurity program against the business set goals. Continue reading
History of Memory and Storage Systems
As we know the memory is a power to remember things. In psychology, memory is the process by which information is encoded, stored, and retrieved. But in computing, memory refers to the physical devices used to store programs or data on a temporary or permanent basis for use in a computer or other digital electronic device. Computer data storage, often called storage or memory. It is a core function and fundamental component of computers. A computer’s memory can be said as a list of cells into which numbers can be placed or read. Each cell has a numbered “address” and can store a single number. In almost all modern computers, each memory cell is set up to store binary numbers in groups of eight bits. A bit is the basic unit of information in computing and telecommunications. A bit can have only two values, either 1 or 0. Eight bits Continue reading
Artificial Intelligence vs Human Intelligence
Artificial Intelligence is the art of programming computers in order to produce intelligent behavior, whereas brain theory is the study of the brains function, to understand how the brain functions, the stimulations that go within and how outputs are produced via mathematical modeling and computer stimulation. It can be argued that both contain similar characteristics for functionality, both works together, this can be seen through artificial intelligence used to understand the roles of brain mechanisms. Furthermore both are involved in high cognitive task, such as reasoning, problem solving and decision making. Although some philosophers have accepted that machines can do everything that humans can do, some disagree with this view arguing that such high sophisticated behavior such as love, emotions discovery and moral decisions can only be carried out by humans. AI for many years has been pursuing the study of intelligent behaviour, but using artificial methodology. Intelligence can be Continue reading