Tzu Ching WuOffice of Personnel Management breach: what would I do?the one of the largest breach on the federal government compromised 21.5 million individual sensitive information.Apr 13, 2019Apr 13, 2019
Tzu Ching WuWhat is NISTDo we need NIST?The increased connectivity and complexity of infrastructure systems expose more and more cybersecurity threats in modern society. They…Apr 5, 2019Apr 5, 2019
Tzu Ching WuShellShock attackThe vulnerability of Shellshock is noteworthy and dangerous since it will cause the compromise of sensitive data because an attacker can…Mar 22, 2019Mar 22, 2019
Tzu Ching Wu2019 紐約地鐵教學,只要知道兩件事!回憶第一次到紐約進城,地鐵是最讓人徬徨的事情之一,路線或許不比東京複雜但是實際的標示讓人眼花撩亂,2個要訣掌握好後,就可以暢行無阻啦!Jan 23, 2019Jan 23, 2019
Tzu Ching WuBasic types of data measurementsknowledge of Bits, Bytes, Megabyte, Frames Packets, and gigabytesJan 22, 2019Jan 22, 2019
Tzu Ching WuRansomware and Crypto Jacking: Two of the cyber threats to health recordSix of the top ten breaches of the year in healthcare were ransomware and the number of ransomware increased from 19 to 36 within one yearDec 31, 2018Dec 31, 2018
Tzu Ching WuWhat is the difference between privacy and security?By distinguishing between privacy and security, we can be more aware of the responsibility of dividing the message. The line between…Dec 29, 2018Dec 29, 2018
Tzu Ching WuHIPAA addresses privacy issues in Health RecordThis is a reflection of the article “Privacy of Individual Health Information”, which is discussed the privacy issue of individual health…Dec 28, 2018Dec 28, 2018
Tzu Ching WuWhy is having codes of ethics important to an organization?“Codes of ethics enhance the trust and respect from the general public because the trust is built on the public expectation“Dec 26, 2018Dec 26, 2018