Define the problem. These questions should be answered when you communicate with your team members: Why do you think there is a need to change? Why should the current system not be maintained? This will be obvious. This can be…
Month: September 2022
WannaCry Ransomware Table of Contents Today is WannaCry’s Birthday, the Ransomware that causes ransomware attacks turns 2 years old. To mark that “Special occasion “(!)” I am happy to share the academic research paper I wrote back then. It is…
This is a departure in my usual writing on project management, but it’s something I’d like you to know about. You may not be aware that I am active in advocacy for people with disabilities. I volunteer for many organizations…
Vulnerable Networks & Services – A Gateway for Intrusion Table of Contents Cyber-attacks are largely focused on communication and network protocols. Many threats are directed at networks and communication channels that are used by people, systems, or devices. Cyber criminals…
Without realizing it, plans play an important role in our daily lives. I will make a steak for dinner, “I want to finish this book”, “I am going with my parents this weekend,” etc. These are just a few of…