We cannot attribute the beginning of cloud computing to a particular person or time. It evolved with the evolution of Internet and enterprise computing. We may be able to trace its roots all the way back when Dr. Larry Roberts developed the ARPANET in 1969. (Whitman & Mattord, 2016) While the evolution of ARPANET, to Ethernet… Continue reading Cloud Computing and Data Security
Authentication is the process of confirming an entity’s identity based on reliable credentials. The process and the technology involved in authentication varies with various level of assurance required from the entity. Authentication Level of Assurance can be defined as the authentication strength required for a relying party to be assured that an entity is indeed… Continue reading Authentication – Level of Assurance
ISPs wants to shape internet traffic while Canadians are still waiting to know the effects on Privacy if two bills – Investigative Powers for the 21st Century Act and the Technical Assistance for Law Enforcement in the 21st Century Act – becomes law.
The Canadian Copyright bill was passed yesterday, a bill that demands a little adjustment to our day to day life. Till now, no one cared who is using our internet connection or what are the files being downloaded or uploaded using it. No one cared of your unscrambled satellite videos from across the border. However that’s all changing even though you may not want it that way. I guess no one can withstand the pressure of the “big guys” for too long.
Very frequently, we hear news of stolen laptops that contains sensitive information which could potentially be anything from Personal Identifiable Information (PII) to corporate intellectual information. The latest being the news in Canada that a consultant for the Provincial Public Health Laboratory lost a laptop that includes names, Medical Care Plan numbers, age, sex, physician and test results for infectious diseases, including HIV and hepatitis.