Forum Replies Created
-
AuthorPosts
-
-
2025-09-16 at 11:39 pm #50573
Wai Phyo Aung
ParticipantDear Bro,
Thanks for sharing this interesting case, I learned that although MFA was used to secure the system and then unauthorized request are blocked automatically. However, auto block function was not enable. It seems to double check or trail whether it does work or not as we always practice in our real work.
-
2025-09-16 at 11:28 pm #50569
Wai Phyo Aung
ParticipantDear Ama Wah,
Thanks for expression!! It is really interesting. I see the challenging to secure the system all the time.
-
2025-09-16 at 11:22 pm #50566
Wai Phyo Aung
ParticipantDear Ko Aung,
Thanks for reflection! I well noticed that how data was breach and it is really terrible that server allow to access the outsider to download without tracing anything.
-
2025-09-14 at 12:03 am #50509
Wai Phyo Aung
ParticipantAs an attacker, He/she will find the vulnerability points of the system. There might be different based on structure of the system.
1) If the structure is web-based and control by user name. The first technique invading the system based on constructed web-based language. The another one will be user name and level of user privilege. If he/she gets the higher level user permission, the impact will be huge.
2) The second facts is based on assets. If asset are stolen or loss and transferred to attackers, they will try to hack or modify based on asset type.
3) IF the IT dataset is offline system, he/she might duplicate and misuses or selling the project to opponent’s company or agencies. -
2025-09-12 at 1:32 am #50473
Wai Phyo Aung
Participant1) I would rather recommend cloud server because physical server is more costly and require IT officer to maintain and fixing issue all the time. Could server is interactive and easily accessible with minimal effort. We can buy a cloud server with effective cost and can assure easily accessibility, mobility, data security and scalability. Moreover, maintenance and support that are taking responsible by service providers. We can spare our IT resource in fixing issues.
2) What kind of cloud computing service model would be most appropriate (SaaS, PaaS, IaaS)? Why?
SaaS is the most appropriate because it is software based and we can easily rely on provided services. It is more user friendly and effective ways. Cloud infrastructure are upgrading all the time based on consumers’ demands and experiences. We can make choice based on hospital requirements and can request to be user friendly model. -
2025-09-10 at 1:45 am #50429
Wai Phyo Aung
ParticipantInformation plays vital role not only in outbreak situations but also in any emergency conditions. Immediate response or Specific information are importance to design outbreak response program. We can’t provide effective services without identifying the community needed or ground situations. In term of Flood response, We created real time data collection tools via KOBO platform to get the update data from the community. Our team conducted rapid need assessment and submitted data via link. Moreover, we also collected information from other local stakeholders to get the affected House hold list including status of safe drinking water. We could provide chlorination tablets to the affected household to prevent waterborne disease. Later on, By using the affected HH list, We also could provide latrines construction and hygiene awareness promotion as three month post-flood response project. As summary, Informatics is important to disseminate and advocate in outbreak/emergency situation.
-
2025-09-08 at 10:25 pm #50402
Wai Phyo Aung
ParticipantRegarding as a public health informatician, there are core skills that are enhancing to be a professional especially public health, IT skills, conceptual knowledge and critical thinking.
1) Public Health
I have foundation of public health knowledge because my bachelor focus on public health. I am also familiar with data collection, data processing and application in the output based projects.
2) IT skills,
I need to improve IT skills especially how dynamic database and dataset are constructed to generate the information in real time event.
3) Conceptual Knowledge and critical thinking
I also need to get the skill sets to create a road map or solution based on public health issue. I haven’t experience in resolving public health issue deeply. -
2025-08-14 at 5:23 pm #49991
Wai Phyo Aung
ParticipantHello Everyone, Nice to meet you. My name is Wai Phyo Aung and you can call me William as nickname. I am from Myanmar. I graduated from University of Community Health, Magway, Mayanmar. I work as a Humanitarian aid worker in an INGO and NGO especially in monitoring, evaluation and learning field. I hope this program will be effective my career development and skill in contribution of my work. Have a good day!!!
-
2025-09-10 at 1:28 am #50427
Wai Phyo Aung
ParticipantYes, I totally agree that EA and national level integration is essential to control it even though different IPs are providing services. Interoperability is key to address.
-
-
AuthorPosts