Posts

Showing posts from October, 2017

Sedikit Kajian Mengenai Ransomware

Ransomware sebenarnya merupakan kombinasi daripada “ ransom ” dan “ malware ”. Jadi ransomware merupakan sejenis malware yang menghalang akses mangsa daripada menggunakan komputer atau mengakses fail tertentu, dan satu –satunya cara untuk mendapatkan semula akses kepada fail adalah dengan membayar wang tebusan.  Malware ( malicious software ) adalah sejenis program yang disebarkan dengan tujuan jahat seperti menggodam sistem, mencuri maklumat sulit, mengakibatkan kerosakan dan sebagainya. Pada dasarnya, fail atau sistem pengguna itu tidak dapat digunakan dan menjadi tebusan sehinggalah bayaran diterima. Kebiasaannya, ransomware jenis “ encryptor ” akan menyimpan sebarang fail pengguna seperti dokumen, gambar, video dan sebagainya dan dikunci menggunakan algoritma yang kompleks. Malware beroperasi secara senyap di belakang sehingga mekanisme sistem atau data-mengunci digunakan. Kemudian kotak mesej akan dipaparkan bagi memberitahu pengguna data telah dikunci dan menuntut wang

MEMAHAMI KESELAMATAN DAN ETIKA KOMPUTER

DEFINISI: Keselamatan komputer boleh ditakrifkan sebagai menjaga keamanan atau kesejahteraan komputer sama ada dari segi sistem dan perisian, data mahupun perkakasan. Keselamatan komputer juga bermaksud amalan melindungi sistem komputer dari kegagalan, ancaman, risiko, dan kelemahan dari pelbagai sudut seperti kesalahan manusia atau operasi, serangan dan bencana alam yang boleh menyebabkan maklumat menjadi terdedah atau maklumat dipinda secara tidak sah, kemusnahan, atau denial-of-service. PRINSIP ASAS: 1.    Kerahsiaan -  mencegah maklumat rahsia dibaca atau diketahui oleh orang yang tidak berdaftar . Jenis capaian - boleh baca , lihat , cetak atau dengan hanya mengetahui kewujudan sesuatu objek atau aset dalam sistem komputer . 2.     Integriti - mencegah sebarang ubah suai oleh orang yang tidak berdaftar . Jenis ubah suai : menulis , mengubah , menukar (status), hapus atau cipta . 3 .    Kesediaan - Orang yang berdaftar tidak sepatutny

CLOUD

Image
Now I'm try to understand more on cloud computing..still read, research and have to read more and more.. here the list security threats that become crucial in cloud: Brute Force Attack :  technique used to break passwords; it’s reliant on powerful computing capability because thousands of possible passwords are needed to be sent to a target user’s account until it finds the correct one to access. Denial of Service (DoS) Attack :  attempt to disrupt a host or network resource in order to make legitimate users unable to access the computer service. Malware Injection Attacks:  The two common forms are SQL injection attack and cross-site scripting attack . SQL injections target SQL servers that run vulnerable database applications. Hackers exploit the vulnerabilities of web servers and inject a malicious code in order to bypass login and gain unauthorized access to backend databases Cross-site scripting (XSS) : Hackers inject malicious scripts,

SATYAM: INFLUENCING FACTORS AND HOW TO PREVENT THE SAME FRAUD?

ABSTRACT Recently, most of biggest fraud and Satyam fraud cases are causes from human ethics. When the human ethics is low integrity, the fraud can begin from the opportunity or the situational pressure based on the organizational environment. Based on fraud report cases, the worst biggest fraud comes from accounting frauds, now what the accounting frauds means; accounting fraud occurred when workers in the organization take benefits from their position by stealing cash or asset. [1] Actually the lower ethics factors and the accounting activities fraud are related with white collar crime. Nowadays, white collar crimes are criminal acts that are performed by people that have potential position and power in organization committed for financial gain. [2]There are have several categories types in accounting fraud like payroll, invoice, account payable, accounts receivable, financial statement and tax fraud. And then, the white collar crime also has several types like computer, bankruptcy

How to Setup PMO - Project Management Office

What is PMO: A Project Management Office (PMO) is a team within the organization which defines, controls, monitors and governs the Tools and Techniques for the End-to-End Project Execution. This team not only establishes the  processes  but also effectively monitors the adherence to such methodologies by respective Project teams. PMO Team works across all the domains of the project such as Risk Management, Resource Management, Ordering Control, Dashboards Establishment, Quality Assurance, Performance Control and so on. (A more detailed information for each domain will come later in this article) Why PMO: If a PMO is established in a professional and successful manner, it will add HUGE value in the organization’s effectiveness; the effectiveness in People, Processes, Productivity,  Cost , Communication, Delivery and Quality. A lot of SMEs have recently realized the importance of setting up PMO because of the aforementioned benefits. What Areas PMO Works In: PMOs help Project 

SARANGHAE TENGKU!!

Qaseh Irdina merenung iklan jawatan kosong di tangannya itu. Kemudian dia mengurut-ngurut dagunya dengan penuh kemusykilan. “ Boleh caya ke ni Hana?” Hana mengangguk perlahan. Dia bangkit dan duduk di sebelah Qaseh. “ Bos aku ni dah 49 kali tukar PA kau tau tak? So, untuk percubaan kali ke 50 ni, aku cadangkan kau pergi. Kalau ikut firasat akulah, Tengku tu, orang terpilih macam kau je boleh handle” “ Ceh, ape maksud kau sebenarnya ni?” “ Just wait n see” ucap Hana sambil tersengih-sengih. Qaseh menggeleng tidak faham. Tapi dia memang nak pekerjaan ini. Gaji 3500 tak termasuk elaun n overtime. Gila best! Kalau sekadar jadik orang kanan Tengku, ikut dia pi sana sini, dah ada gaji besar macam ni, sape tak nak kan? *********************************** Perlahan Qaseh menapak masuk ke rumah mewah itu. Fuhh, besar tak hengat! Ni kalau main lari-lari kompem putus nyawa. Ok, aku merepek lagi. “ cik Qaseh. Tengku dah tunggu di dalam. Silakan”  seorang wanita le