The link above is a video link of my presentation on Cisco SD-WAN
Paper Author: Fortinet Inc
Paper Title: The Fortinet SDN Security Framework: Agile Security for Software-Defined Networks and Data Centers. June 20, 2016.
Statement of Problem: Security is an ever-evolving Solution within the Networking field, hence it must improve and keep evolving as the years go by.
Purpose: The author reiterates the importance of evolving in Network security as the needs keep increasing. This rise demands a counter-measure against advanced threats inside the perimeter, thereby maintaining visibility and control with dynamic and logical network flows in increasingly software-defined environments.
Critiques: Fortinet clearly states the importance of Network security to improve and…
Paper Author: Cisco Systems Inc
Paper Title: Direct Routing for Microsoft Phone System with Cisco Unified Border Element (CUBE) v12.8.0. 11 June 2020.
Statement of Problem: The growing demand for a secured video-conferencing and real-time meeting solution has skyrocketed due to the COVID-19 pandemic. This demand has created the importance of several solutions having great synergy and interoperability between one another. Cisco and Microsoft Have therefore created a solution to meet this demand.
Purpose: Customers using Microsoft Phone System have the option of connecting to the public telephony network (PSTN) using a certified Session Border Controller (SBC), such as the…
Paper Author: Janne Helms
Paper Title: Information Systems Security Policy Management: A Literature Review; Master’s Thesis, Degree Programme in Information Processing Science, Faculty of Information Technology and Electrical Engineering, The University of Oulu,16.06.2019
Statement of Problem: The Management of information security policies can be viewed as a tedious and tiring task, Hence irregularities and discrepancies may arise as it is easily dismissed or done quickly by the policy enforcers. There are several aspects to cover and components in managing information systems policies which makes it a daunting task.
Purpose: The purpose of the thesis as enumerated by the author, is…
Paper Author: Seyed Mohammad Tayebia, Saeed Rajabi Manesha, Mehdi Khalili, and Soheil Sadi-Nezhada
Paper Title: The role of information systems in communication through social media. International Journal of Data and Network Science 3 (2019) pp 245–268
Statement of Problem: Communication has always been crucial in information technology. However social media has become a medium in which we communicate with one another with our socio-economic environment and also our co-operate lifestyles. The need to manage this communication within the social sphere is paramount and the information system program or model plays that role.
Purpose: The purpose of the article as highlighted…
My Feedback and Thoughts on DSI Security Webinar series: Cisco Duo
The Author Marvin Rhoads, who has been at DSIYS Solutions incorporated for more than four years were he currently serves as a Senior Network Security Engineer was very clear, precise, and eloquent in delivering this top-notch security solution called Cisco Duo.
Prior to listening to this Webinar, I have already presented and understood the concept and technology behind Cisco Duo security, but I genuinely enjoyed his presentation as he gave further clarity to the need and value Cisco Duo provides within the IT space. The recent acquisition of…
Information systems fondly referred to as IS refers to the process of managing and utilizing organized data over a period of time. Information is often mistaken as data by many including myself in time past. However, A little understanding of information systems has given me a better understanding of the difference between raw facts(Data) and organized, specific, and timely data(information). Data becomes valuable when it can be processed, analyzed, critiqued, and also intelligently utilized accurately.
Information is crucial in decision making as it initiates processes which in turn produces an outcome(Kreps 2016). The value information holds usually has a life-span…
The world has grown from using trade by barter, cowries, gold, cash, and now digital transactions fondly collected e-commerce. The digital transformation wave has brought about faster and easier means of trading and doing business. However, this era has also resulted in the demand for a more secure and robust infrastructure while engaging in transactions over the web or digital space. This has given rise to the use of stringent means and measures of securing our transactions. some examples include; Multi-factor Authentication( Passwords/Pin and Biometrics), QR(Quick Response)Codes, One-time password(OTP), and tokens just to mention a few.
Taking a deep dive…