Skip to main content

Home/ CSIA 459/ Group items tagged Cyber

Rss Feed Group items tagged

Alvin Thomas

Cybersecurity -- Emerging Technologies in Cybersecurity « WHS WHS - 10 views

  •  
    This is a cool and insightful article regarding emerging cyber security technologies. 
  •  
    I think the part about centralizing a "single federal enterprise network" is a great idea. The federal government has started doing this with things such as the FDCC (Federal Desktop Core Configuration), as well as SCAP (Security Content Automation Protocol), but I think there still needs to be much more. Allowing each federal agency to have their own cyber security within the U.S. seems a little crazy. I think setting one agency to protect the national infastructure, ie the borders of the U.S., down to each agencies front door needs to be standard. Agencies like DOD who have their own Cyber operations centers need to be properly trained and educated if they are going to defend infrastructure. Formalized training needs to be done at the federal level as well as the Civilian level. If you are going to be a security practioner, you must have the credentials, and I am not talking just a Sec+. I think it is time we up the standards on who we call a CyberSecurity professional.
  •  
    Interesting article and objective given. Connecting government cyber operations centers, I think that this will be a hugh, and important step toward achieving a higher level of security. Good read!
Lee Bry

Cyber Threat: On the Front Lines with Shawn Henry - 3 views

  •  
    Our departing top cyber official reflects on how the FBI has adapted to an evolving threat. Shawn Henry is executive assistant director of the FBI's Criminal, Cyber, Response, and Services Branch. He served as assistant director of the Cyber Division from September 2008 to January 2010, Note: Shawn Henry retired from the FBI on March 31, 2012. This is an excellent interview with Shawn Henry describing todays cyber actors
  •  
    This is a good article. I though the FBI was smart in having IT people trained to be agents as apposed to the reverse.
Amy Harding

Cyber War! - 32 views

shared by Amy Harding on 06 Mar 13 - No Cached
  •  
    Click through this Cyber War website.
Amy Harding

Blueprint for a Secure Cyber Future - 30 views

  •  
    This document is used for your Week 1 discussion questions.
Vickye F

http://www.us-cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf - 0 views

  •  
    This website gives information about Cyber Threats to Mobile Phones. The US-CERT provides valuable information on this site concerning recent threats.
Joseph Deleon

Cyber War 2.0 -- Russia v. Georgia - 0 views

  •  
    Fun article about the cyber side of the 2008 conflict, good read.
cpanagopulos

Agency Spends Millions Purging Fake Cyber Threat - 3 views

  •  
    Call it the cyber-attack that never happened. A false alarm that sent the Economic Development Agency scrambling. When the dust settled, the EDA had spent half of its information technology budget - or nearly $3 million - destroying hundreds of thousands of dollars worth of perfectly functioning computer equipment. Talk about using up your resources...literally.
  • ...1 more comment...
  •  
    Great artical. There must have been enough positive indicators for the EDA to take action. In a case like this it's better to be safe than sorry, but that doesn't make it easier to explain to tax payers!
  •  
    What stood out to me was that they did not follow the incident handling procedure. Those documents are put together for a reason. I also question why there was not a manager to oversee the incident response for something of this size. I blame management for this one.
  •  
    I agree with a better safe than sorry approach most of the time, but I have to agree with Bob that procedures weren't followed and equipment was unnecessarily destroyed.
Amy Harding

Video: Flame: Trying to Unravel the Mystery of Spying Malware | Watch PBS NewsHour Onli... - 4 views

  •  
    "Flame: Trying to Unravel the Mystery of Spying Malware"
  • ...1 more comment...
  •  
    Two things I found very interesting about Flame is the size of the malware as well as the ability to utilize Bluetooth to collect data. Considering Bluetooth usage has increased in some countries and is automatically turned on by default on cell phones, this could enable a lot of information to be collected.
  •  
    We will see more of this type of modification of Stuxnet and Flame. The bad thing about finding stuff like this, is others who could not have made malware as technically advanced as this, will be able to modify it much easier than if they would have had to design it from scratch.
  •  
    focused on the comment made by the analyst on the differentiation of cyber "war" vs. cyber "espionage" as it appears that Flame is more on cuber espionage since it is desgined to collect infor from specific targets.
Amy Harding

What should we expect from next cyber weapon? Hypothesis on Stuxnet 3 | Security Affairs - 28 views

  •  
    For your Week 6 discussion.
samuelrios

Court Says C.I.A. Must Yield Some Data on Drones - NYTimes.com - 3 views

  •  
    Article supports drones as being an emerging technology. ASSignment1, Part1 Support
  •  
    Interesting article, It seems to me that this is just another one of those cases about flexing the "muscle" of the Freedom of Information Act. In my opinion it is pretty common knowledge that targeted drone strikes are being used to eliminate enemies; so why is it so important here that the C.I.A. has to acknowledge these attacks? What would that accomplish? The media outlets already report on successful drone strikes and now there are even military medals to recognize drone pilots. http://www.fsunews.com/article/20130318/FSVIEW0303/130317001/New-military-medal-stirs-controversy-?odyssey=mod|newswell|text|frontpage|s
  •  
    I just wonder how long it's going to take before something comes out of these attacks. Using these drones to fly into other countries like Pakistan, and "take out" suspected enemies is pretty borderline in my opinion. If this were to happen in America, we would certainly not stand for it, and would declare war on the country that carried out the action. Pushing the button from California on a drone missle is alot like conducting cyber warfare from one country to another. The damage that can be done is becoming greater and greater every day as technology is starting to tie together national infrastructures. In my opinion, drones are the some of the first of the cyber warfare machines.
Ben Garey

Bloomberg Cybersecurity Conference: Understanding Cyber War - and Fighting Back | Secur... - 0 views

  •  
    Bloomberg is hosting a conference on Cybersecurity. Bloomberg is on the cutting edge of the field and they are doing a great job bringing threats into the public eye.
Joseph Walbert

Cyber Modeling (5 of 5) - 0 views

  •  
    Game Theoretic Solutions to Cyber Attack and Network Defense Problems
Joseph Walbert

Cyber Modeling (3 of 5) - 0 views

  •  
    The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions.
Percy Kendrick

US-CERT | United States Computer Emergency Readiness Team - 3 views

  •  
    US-CERT's mission is to improve the nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the nation.
  •  
    The "Alerts And Tips" page of this site provides excellent up to date alerts. (http://www.us-cert.gov/ncas). Subheadings include: Current Activity, Alerts, Bulletins, and Tips. The Bulletins page provides weekly vulnerability summaries. It's worth a look for anyone who hasn't seen this already.
Amy Harding

Scope Of APTs More Widespread Than Thought - Dark Reading - 3 views

  •  
    Researcher uncovers hundreds of different custom malware families used by cyberspies -- and discovers an Asian security company conducting cyberespionage
  •  
    This article raises some serious questions in my opinion. As we move more into an environment where cyber warfare is to be used against different countries, where are the lines drawn between declaring war. As this article discusses, it is not as easy to see who actually was behind the attack, and an attack coming from Chinese, or some other countries IP space, is not neccessarily a state sponsored attack, nor is it neccessarily coming from someone inside the country. In a hack back scenario, it could be determined after the fact that whatever country was thought to initiate the first move, was actually a victim of a "zombie/bot" type of controlled attack that was actually initiated in another country. Can you say, Wargames? Edited 3222013: as I spoke yesterday, today guess what? http://news.yahoo.com/skorea-misidentifies-china-cyberattack-origin-071350510.html
Amy Harding

National Webcast: Cyber Security Emerging Trends and Threats for 2013 - 40 views

  •  
    This webcast is part of your Week 4 required reading/watching. Click on Archived Recording Now Available link and the video will open. On the right side of the screen you will see segments and you can click through the video and/or have to break the video down into smaller chunks.
Amy Harding

Biometrics and Cyber Security - 8 views

  •  
    Review the presentation.
  • ...3 more comments...
  •  
    This article does mention balancing some weaknesses of biometrics. The one weakness that is common right now among these systems is the use of usernames and passwords to form a secondary means of accessing the system once the biometrics no longer work. With the implementation of multi-modal systems, this could be resolved. The article also discusses international based systems, which could be difficult, personal information is a source of contention between many countries. Where is the information stored, and what laws become enforceable depending on the users point of presence?
  •  
    Interesting article thank you for posting it. As Phil and the article mentioned where is this information stored. The security of this information is deeply concenring. Not that I am a conspiracy theorist but I really do not want my biometric information to be stored on some database. I remember when my daughter was young there was a push to have your child's DNA sample taken and stored in case it was ever needed in the event the child was kidnapped or lost. After thinking about it back then I just did not see how the government having her DNA sample was a good thing. Of course if she ever comitted a crime I would like to think that I would want her punished for the crime but being a parent I also know that I would do anything to protect her, so why would I give the government a readily available DNA sample for them to identify her with. In the event a sample was needed because of some terrible event happening to her one could be provided through other methods. Just my thoughts.
  •  
    I just posted up an article on fooling biometric fingerprint scanners, Facial scanners can be fooled with photos http://thehackernews.com/2011/11/android-facial-recognition-based.html The Danger is that while one can get a new password or smart card if the old is compromised, You only have one face, two eyes and 10 fingers to use for ID and can't get new ones when someone figures out how to comprimise them.
  •  
    Thanks for the posting especially since my project deals with Ambient Intelligence wherein biometrics can be an integral part of its implementation. One of the most common and frequent incidents in Service Management is authentication. Whether it is with entering secure facilities or logging into computer systems both in the office and remotely, people tend to forget their credentials. Consequently, this causes a loss in productivity as someone tries to regain their access to systems or for system administrators to provide them with temporary access. Ambient intelligence and biometrics may seem as a viable solution since the physical characteristics is intrinsic in each individual. This presentation presents me with the cybersecurity flaws and weaknesses that should be mitigated.
  •  
    Biometrics is always something I have found to be fascinating. Because like this article stated no one knows who you are on the other end of that computer so being able to authenticate that in some sort of method is a great thing
Vickye F

http://www.northjersey.com/news/international/199167071_S__Korean_Banks_Fall_Victim_to_... - 0 views

  •  
    How can you tell who is servicing your systems if they are in the clouds? Should the ATM network be placed in the clouds? Something to ponder about
Trevor Pyle

Cyber War Over Spam Slows Access for Internet Users | PBS NewsHour | March 27, 2013 - 2 views

  •  
    PBS Newshour video on the clash between Spamhaus and Cyberbunker.
Amy Harding

http://www.safegov.org/media/46155/measuring_what_matters_final.pdf - 3 views

  •  
    Agencies must establish a unique baseline threat assessment and automate monitoring to ensure good cybersecurity, says a SafeGov report released Tuesday.
  •  
    Safegov has an interesting approach to cybersecurity. I feel the framework an effective way to approach security. Ben
  •  
    The legislation proposal aims at achieving cybersecurity due to increased network threats in government and in organizations. Educating the public and the use of cyber security technologies have great impacts on government agencies. Our government department comply with NIST and ISO/IEC, and the two bodies help in enhancing privacy and security in the national and international levels. It is important to identify efficient operational, technical and management security controls in a comprehensive computer security plan. Risk assessment in management control assists in identification of risks and in putting up risk assessment policies. Operational controls have their basis on restrictions to access information resources and in user permissions. Sam
1 - 20 of 38 Next ›
Showing 20 items per page