-
![image](https://github.com/DiWien/Certificate/assets/88604764/a4b7a966-0ce6-4a2d-adbb-54b44f27626b)
https://coursera.org/share/488494ca9ffbd384cc63d8eb4a1a6b19
![image](https://github.com/DiWien/…
-
It would be cool if you could add fire alarm control panels and call points/pull stations and/or security systems with keypads, motion detectors, and door sensors
-
In our current setup, we rely on Intrusion Detection Systems (IDS) and firewalls to identify and block malicious IP addresses temporarily to mitigate pending attacks. These systems are crucial for pro…
-
In a discussion in the AI/ML meeting on 08/05/2024, @VenkatTechnologist proposed
that the AI team take a deep look into security aspects and parameters of AI systems.
Karen suggested that Venkat lea…
-
## Issue Description
As a VA Platform I want to ensure that the toxic exposure feature meets Platform's privacy and security standards so that it can be released successfully while protecting the safe…
-
Please set the title to indicate the test name and machine name where known.
To make it easy for the infrastructure team to repeat and diagnose, please
answer the following questions:
- test su…
-
**Access Review Description:**
OCTO-DE teams are responsible for periodically reviewing access to systems and applications they manage to ensure that only authorized personnel have the required acce…
-
Currently we have a dependency on version 4.7.0 of System.Security.Cryptography.ProtectedData in Packages.Data.Props. Upgrading this to 6.0.0 results in warnings, because these APIs only work on Windo…
-
Having the following scenario: We are open sourcing apps from time to time and maintaining them as well ;-). Our most popular Django app is [django-hijack](https://github.com/arteria/django-hijack). D…
-
We must add the American Security Drone Act of 2023 under the FASCSA Order Check information section in each of the five trainings.
Lesson 3 for Travel Training for Training for Card/Account Holders …