9/18/17

Just telling

Enterprise Information Systems Security Architectural Framework[EISSAF]


Some may wonder why there's been such a long lull in activities on this site. School is back in Session, as is so many other volunteer activities I am engaged in, as well as my day job of course.

But that's not the main reason for the lull though. I have spent the better part of the last three weeks reviewing the concept of security metrics. I have found several interesting ideas from the most unexpected places, at least in my opinion, and I am closer to a framework today than I was several months ago.

Ok, some of you will ask why I'm being so cryptic. Well remember this is also my doctoral research whose results will culminate in a dissertation. Also, many journal publishers prefer to be the first to publish a work and some of the contents I have either been submitted or will at some point be submitted for publication. The stuff I present here are stuff, I believe (in my naivete) to be 'safe' , without jeopardizing my work.

Ok, I am, however happy to discuss and even share my ideas and research with you, but will prefer to know who I'm telling(si ?) .

I am interested in speaking or teaching opportunities where general security topics are the focus of discussion. I will also be happy to take on challenges in enterprise information system security architecture as an 'adjunct consultant'. (Ok I coined the phrase).

Feel free to contact me for any reason at all, except of course if you're trying to sell me some porn or stuffs like that.

Ok. I'm still alive and kicking, as well as working. I'm on a tight time budget though.

Boehner on Baltimore Cops: ‘If These Charges Are True, It’s Outrageous

"Invest in Education and Job Training Programs" ~ These seems to be on top of every politician to do list, to address the problem in cities like Baltimore. But they all seem to have forgotten the "lost generation" of minorities (particularly black men) who, haven entered the "system" now have no way out.

They are deprived access to meaningful re-entry into society. Many who have the right education still have difficulty accessing jobs at the same level as their peers.

Education and Job training yes. Drug law reform yes, discrimination against felons who have paid their "debt to society" must stop, and what about all the thousands who have been incarcerated for non-violent crimes ~ expunge their records and give them a real second chance.

And yes, police reform laws must not be just be about body cams. The laws must protect citizens as much as it protects officers who risk their lives. Policing is about protection, not harassment, and  the laws must ensure that for the sake of all. 

--> Boehner on Baltimore Cops: ‘If These Charges Are True, It’s Outrageous’

4/26/14

Splunk: for Operational Intelligence

In this series, I am going to bring you in on my journey to make Splunk an operational intelligence platform and get this veritable tool to live up to its billing in a medium sized enterprise that features all the usual systems, user categories and issue, from security, to performance, to sustainability and customer relations.

The first step involves understanding the roles, features and capabilities of #Splunk. Splunk was invented about 8 years ago as a Google, but for enterprises and for machine data. I discovered Splunk in 2006 and since then I have had a near romantic relationship with the tool and the platform, given it's power than, and of course it's promise.


=====

Splunk is a data goblin system capable of eating up data spewed or thrown at it from almost any machine source and in about any format, and then it indexes the data it gobbles up in preparation for human consumption. Some common machine data include unix syslog ( also syslog-ng), windows log. Splunk relies on "data sources" and these could be from tradditional syslog port (514), splunk forwarder port (9997), any tcp or udp port (as configured),  files and even via scripts. This utilitarian approach to consumable  data source is one of Splunk's real strength.

Once Splunk get's the data, regardless of the source, it indexes it. A Splunk index is a collection of databases or subdirectories located in $SPLUNK_HOME/var/lib/splunk. $PLUNK_HOME is the home directory of your splunk installation, and in Unix systems it is usually in /opt/splunk. The index databases represent Splunk Apps. 


https://docs.google.com/document/d/1Rnn3WWtBRt99vMDOeHm0dpFaCvcyg2PUMN7zUiWA5ZY/edit?usp=sharing

10/25/11

Bibliography from Dissertation


1. Smithsonian Institute. Vote: The Machinery of Democracy. [Online] 0 0, 2004. [Cited: September 16, 2006.] http://americanhistory.si.edu/vote/votingmachine.html.
2. Jones, Douglas W. Douglas W. Jones Illustrated Voting Machines History. [Online] 2003. [Cited: January 15, 2005.] http://www.cs.uiowa.edu/~jones/voting/pictures/#punchcard.