Tag Archive for: ideal

‘It’s not ideal’: Kansas lawmakers talk security incident that took down online court access


TOPEKA — A dragon spitting fire at the Kansas statehouse, depicted in a Vincent Van Goh style, illuminated the possibilities of Artificial Intelligence to lawmakers during a Wednesday meeting.

An overview of AI creative designs provided some levity before legislators turned to discussion of the state’s changing internet landscape — one that IT officials have repeatedly warned needs to be better secured.

“I’d like to improve our ability to respond and recover from cyber incidents, including testing, tracking and training for known unlikely eventualities,” said Michael Murphy, security engineer with the Kansas Legislative Office of Information Technology.

Murphy said he and other legislative IT staff would look into system security upgrades and improvements before the upcoming legislative session.

“The first priority right now is security awareness training,” Murphy said. “Like I said, the biggest point of failure is going to be the people. So we need to make sure everybody’s trained up on how to do things properly.”

The renewed discussion on internet security comes after a “security incident” that shut down online operations for most of the state’s courts. Kansas’ judicial branch publicly announced the issue on Oct. 12, later indicating that clerks in 104 counties were unable to receive online filings. The Johnson County District Court, which operates its own e-filing and case management system separately from the state, is the only state district court not affected.

While courts are still operating, all filings have to be submitted in paper. The investigation into the incident is ongoing, with little information publicly released.

“We also have to figure out how to stop these bad actors from doing things that screw everything up, like they’ve done in judiciary,” said committee lawmaker Rep. Barb Wasinger, R-Hays, before lawmakers withdrew to speak privately about judiciary IT security during an executive session.

Though last year’s risk assessment of the state’s court system has been earmarked as confidential, previous audits of several state agencies have shown several weaknesses. A cybersecurity…

Source…

An ideal framework for the accountable use of personal data by law enforcement and state security agencies


Image: Andrea Estafanía for APC

By Koliwe Majama

Published on
Page last updated on

The world is increasingly becoming digitised, with a significant amount of personal data being collected, stored and mined by different public and private sector players, in the various countries and communities, for one purpose or the other. Digitisation has increased efficiency of services and enhanced customer experiences of the same, as service providers take advantage of data-driven customer insights to improve what they offer to the public. Digital technologies have also provided law enforcement and intelligence services with new methods to tackle crime as they make use of personal data, in the form of communication, transaction or location data, to investigate unlawful acts.

However, while digitisation is enhancing law and order, there are increasing concerns over the manner in which some of the data collected through automated digital technologies and data mining is being manipulated or misused. This has prompted calls for more accountable use of personal data by law enforcement and state security agencies to protect the rights of citizens.

Collection of personal data by law enforcement and state security

Law enforcement agents collect digitised personal data of targeted individuals or organisations to aid in criminal investigations at different stages and in various ways. Evidence gathered can be used in a court of law against the targeted individual. However, there are also instances where some state agents collect vast amounts of data, which is not targeted at specific individuals, but as an intelligence gathering process and for use by government in decision making.

In a recent meeting of the Global Encryption Coalition on government hacking, panellists shared forms of government hacking for either criminal investigation or intelligence gathering, with three methods most relevant to our African context. The first…

Source…

Bitdefender Internet Security 2015: The Ideal Choice For Home PCs [Giveaway] – MakeUseOf


MakeUseOf

Bitdefender Internet Security 2015: The Ideal Choice For Home PCs [Giveaway]
MakeUseOf
Bitdefender Internet Security 2015's most basic package is a one-year licence for use on three PCs, making it ideal for the average household equipped with a desktop and a couple of laptops. Other options are available, up to ten PCs and three years.

“internet security” – read more

What’s an ideal minor for majoring in Computer Information Systems and Security?

I’m currently attending a University and pursuing a B.S. in Computer Information Systems and Security.An ideal career I’m looking at is a Criminal Investigator (Cyber-Tech).

I originally thought about minoring in psychology (online social engineering, human-computer interaction, etc), but then I thought about minoring in Criminal Justice.

Which minor would be more appropriate for a career as a Criminal Investigator (Cyber-Tech)?