Friday, March 26, 2010

Professional Organizations International IT professional organizations:

Association of Information Technology Professionals (AITP) - The organization’s mission is to provide superior leadership and education in Information Technology. AITP is dedicated to using the synergy of Information Technology partnerships to provide education and benefits to our members and to working with the industry to assist in the overall promotion and direction of Information Technology.
American Society for Information Science (ASIS) - Since 1937 ASIS has been the society for information professionals leading the search for new and better theories, techniques, and technologies to improve access to information. ASIS brings together diverse streams of knowledge, focusing what might be disparate approaches into novel solutions to common problems. ASIS bridges the gaps not only between disciplines but also between the research that drives and the practices that sustain new developments
The Information Technology & Telecommunications Association (ITTA) - The Information Technology and Telecommunications Association is the resource for information technology and telecommunications professionals involved in transporting, connecting and integrating data, image, video and voice.
Institute for Certification of Computing Professionals (ICCP) - Founded in 1973, the Institute for Certification of Computing Professionals is acknowledged throughout the information and technology sectors as an authoritative source of professional certification. The CCP examinations demand a high degree of professional competence. The tests are organized into 17 specialty exams ranging from Business Information Systems to RPG/400 Language.
The System Administrators Guild (SAGE) and the USENIX Association - The organization’s mission is to advance the status of computer system administration as a profession, establish standards of professional excellence and recognize those who attain them, develop guidelines for improving the technical and managerial capabilities of members of the profession, and promote activities that advance the state of the art or the community.

National IT professional organizations:

Information Technology Association of the Philippines (ITAP) - is a private, independent and non-profit association whose members are composed of leading product and service providers of Information and Communications Technology. The group is aimed at promoting ICT development and its usage as it contributes to the economic growth and global competitiveness of the Philippines.
Information Technology Foundation of the Philippines - was established in 1994 and acts as an umbrella for around eleven ICT associations in the country. The mission of ITFP is to represent and act as the single voice of the Philippine IT sector. The objectives are to accelerate the development of the Philippine Information Technology industry and help the segment by conducting and supporting projects and activities that will lead to the attainment of its purposes.

Information Systems Audit and Control Association ISACA-Manila Chapter is an organization for Information Systems (IS) professionals in the Philippines providing a source of information, education and guidance in IS auditing, control and security. They provide complimentary download of COBIT™ and offers CISA. and CISM™ accreditation to its members.

As an IT graduating students of the College, what Certification or Licensing you are aiming for? Why?

Licensing could become a venue to assess the expertise, knowledge and skills of an individual in the field; hence, excellence and quality of performance is always assured of. It could serve as an evidence proficiency and capability of doing the things you are expected to be come an good IT professional in future.

Saturday, February 20, 2010

Google @ China

Google is the largest search engine with the most number of users worldwide (?) It pro¬vides a means for users to search through the Internet any information needed. Google also pro-vides service as GMail – an electronic mail service.
Some time, Chinese authorities censored search results from Google and hacked some GMail accounts in its way to investigate some human rights activists. China’s act of what is known as “cyber oppression” is such a manifestation of what is called intrusion or violation of ones right to privacy.
With what China did, Google withdraws its operation in the country. This is such a good decision. This is a very positive develop¬ment in safeguarding Internet users from unauthorized disclosure of personal accounts. It proves the premise that not all organizations are only on the look for big profit but also to the protection of its patrons right to privacy.

The above post is a reflection or essay on the article of Dr. Florangel Braid in Manila Bulletin entitled "Google and Skype".

Sunday, December 6, 2009

Professional

What is Professional Experience?

Answer:

To meet the requirements of the RIBA Professional Experience and Development Record, and to have direct experience under supervision of the duties and responsibilities of professional practice which will become the students upon qualification, the RIBA specifies certain mandatory minimum requirements to be achieved by the student within this time period. These are:
A minimum of 24 months of recorded professional experience, 12 months of which must be after passing or gaining exemption from Part 2 of the RIBA Examination in Architecture, under the direct supervision of an architect in the United Kingdom. (Regulation 1)
A minimum of 10 working days' approved study leading to the RIBA Examination in Professional Practice and Management, (Part 3). (Regulation 3)
A minimum 35 hours a year continuing professional development, per year. (Regulation 4)
Although it is not mandatory, the RIBA advises that a minimum of 3 months' experience of professional architectural practice under the direct supervision of an architect outside the United Kingdom provides useful experience for architectural students as part of his or her educational and professional development.
The RIBA Professional Experience and Development Record records professional experience in 3-month periods. A period of less than 3 months' duration will not normally be accepted as valid professional experience. (Except, of course, for CPD, professional and community activity and study for the RIBA Examination in Professional Practice and Management, (Part 3), which are subject to maximum time limits of less than 3 months.) Professional Experience and Development Records should be used to record each 3-month period of professional experience.

What is Professional Development?

Continuous Professional Development is the systematic maintenance, improvement and broadening of knowledge and skill, and the development of personal qualities necessary for the execution of professional and technical duties throughout your working life. Put more simply, it is a life-long learning approach to planning, managing and benefiting from your own development.
By undertaking CPD you can:
Maintain and enhance your competence in your current role
Ensure you are competitive in the job market
Demonstrate commitment to your own development
Find a new intellectual challenge
CPD is not an adjunct to your work, and the need for it is not dependent on your life or career stage (although it is a requirement for Chartered status). CPD can be any activity –in fact, you are probably doing it already – as long as you take a systematic approach to planning, undertaking, recording and reviewing your development.

http://www.pedr.co.uk/textpage.asp?menu=1a&sortorder=40&area=main
http://www.iop.org/activity/cpd/Professionals_wishing_to_undertake_CPD/page_3979.html
http://en.wikipedia.org/wiki/Profession

Saturday, January 10, 2009

Types of Attacks to Computer Security

1. What are the different types of attack

Answer:

Virus
Computer viruses have a long history. A virus attempts to install itself on a user's system and to spread directly to other files on that system with the aim that these infected files will be transferred to another machine. The payload of a virus can range from 'comical' pranks to destruction of the system itself.
A virus relies on users to spread by sharing infected files either directly or via email. Once launched, a virus is completely independent of its creator.
Although the most common threat to security, the traditional virus does not attack other systems directly and so is unlikely to be detected by KFSensor.

WORM
A worm is very similar to a virus. The key difference is that a worm attempts to propagate itself without any user involvement. It typically scans other computers for vulnerabilities which it is designed to exploit. When such a machine is identified, the worm will attack that machine, copying over its files and installing itself, so that the process can continue.
KFSensor excels at detecting worms as they scan and attempt to attack very large numbers of systems at random.

Trojan
Trojans take their name from the trojan horse of Greek mythology.
Computer trojans work in the same way. A game, screen saver or cracked piece of commercial software is given to a victim. The software may appear to work as normal, but its real purpose is to deliver a payload, such as a virus or a root kit.
Root Kit
A root kit is a piece of software that once installed on a victim's machine opens up a port to allow a hacker to communicate with it and take full control of the system. Root kits are also known as back doors. Some root kits give a hacker even more control of a machine than a victim may have themselves.
The SubSeven root kit allows an attacker to turn off a victim's monitor, move the mouse and even turn on an installed web cam and watch the victim without their knowledge.

Hybrids
Often malware is a dangerous hybrid that can combine the features of the different classifications described above. The SubSeven root kit is delivered and classified as a trojan.
Scanners
Scanners are tools designed to interrogate machines on the Internet to elicit information about the types and versions of the services that they are running. There are a variety of scanners, some just ping for the presence of a machine, others look for open ports, while others are more specialized in looking for vulnerabilities of a particular type of service, or the presence of a root kit. Scanners are often incorporated into other malware such as worms.
Scanners are a favorite tool of a hacker, but are just as useful to security professionals trying to detect and close down system vulnerabilities. KFSensor detects scanners and is effective at misleading them.

Hacker
Hacker, H4x0r5, crackers and black hats are all terms for those individuals that KFSensor is ultimately designed to detect and offer protection from. The term hacker is used in this manual to cover all such individuals.
Direct, or manual actions, by a hacker are much rarer than the attacks launched by the tools described above. Hackers usually only attack a system directly once a system has been identified as vulnerable or has already been exploited by an automated tool.