Posts

Showing posts from April, 2018

Jörg Eugster

Image
Jörg Eugster Introduction If not stated otherwise, the information for this blog entry was obtained from Jörg Eugster (2018), online pioneer from the very beginning and lecturer. As a visionary who lives what he propagates, also his blog uebermorgen.com is ahead of its time. Internet of Things (IoT) IoT is the concept that allows the connection of any device to the Internet, any device meaning not only smartphones but also coffee makers, fridges, lamps. Even components of machines applies to the concept of IoT. In general, anything one can think of that has an on and off switch can be part of IoT. The relationships in this giant network is going to be between people, things or people and things. Hence, it goes without saying that the concept of IoT will highly impact our life (Morgan, 2014). Jörg Eugster mentioned the story of the smart fridge combined with the invention of the Radio Frequency Identification Tag (RFID). RFID’s will be placed on product packaging so the pr...

Netcetera

Image
  CIA Triad of Information Science The CIA triad, hence the confidentiality, integrity and availability model is a tool used to evaluate and implement information security of an organization. As a matter of fact, these three components are defined as the most crucial ones of security and often exploited through different degrees of attacks. (Technopedia, 2018) Information security focuses mainly on the protection of the following three elements: Confidentiality , that consists of making data accessible only to intended users as well as systems and not making it available or disclose it to unauthorized individuals, entities, or processes. Integrity , which means maintaining and assuring the accuracy and completeness of data without being modified in an unauthorized or undetected way. Availability , that consists of making sure that the computing systems used to store and process data, the security controls used to protect it, and the communication channels ...