Skip to main content

Home/ CSIA 459/ Group items tagged Cybersecurity

Rss Feed Group items tagged

Amy Harding

NIST sorting comments on cybersecurity framework - FierceGovernmentIT - 7 views

  •  
    Be careful what you ask for -- NIST is now sorting through all the public comments related to the cybersecurity executive order and 185 days to get the framework publish.
Amy Harding

McConnell: Cybersecurity framework will reduce risk, but not 'fix the problem' - Fierce... - 2 views

  •  
    Interesting thoughts from DHS about the recently signed cybersecurity framework.
Alvin Thomas

Cybersecurity -- Emerging Technologies in Cybersecurity « WHS WHS - 10 views

  •  
    This is a cool and insightful article regarding emerging cyber security technologies. 
  •  
    I think the part about centralizing a "single federal enterprise network" is a great idea. The federal government has started doing this with things such as the FDCC (Federal Desktop Core Configuration), as well as SCAP (Security Content Automation Protocol), but I think there still needs to be much more. Allowing each federal agency to have their own cyber security within the U.S. seems a little crazy. I think setting one agency to protect the national infastructure, ie the borders of the U.S., down to each agencies front door needs to be standard. Agencies like DOD who have their own Cyber operations centers need to be properly trained and educated if they are going to defend infrastructure. Formalized training needs to be done at the federal level as well as the Civilian level. If you are going to be a security practioner, you must have the credentials, and I am not talking just a Sec+. I think it is time we up the standards on who we call a CyberSecurity professional.
  •  
    Interesting article and objective given. Connecting government cyber operations centers, I think that this will be a hugh, and important step toward achieving a higher level of security. Good read!
Amy Harding

http://www.safegov.org/media/46155/measuring_what_matters_final.pdf - 3 views

  •  
    Agencies must establish a unique baseline threat assessment and automate monitoring to ensure good cybersecurity, says a SafeGov report released Tuesday.
  •  
    Safegov has an interesting approach to cybersecurity. I feel the framework an effective way to approach security. Ben
  •  
    The legislation proposal aims at achieving cybersecurity due to increased network threats in government and in organizations. Educating the public and the use of cyber security technologies have great impacts on government agencies. Our government department comply with NIST and ISO/IEC, and the two bodies help in enhancing privacy and security in the national and international levels. It is important to identify efficient operational, technical and management security controls in a comprehensive computer security plan. Risk assessment in management control assists in identification of risks and in putting up risk assessment policies. Operational controls have their basis on restrictions to access information resources and in user permissions. Sam
Ben Garey

Bloomberg Cybersecurity Conference: Understanding Cyber War - and Fighting Back | Secur... - 0 views

  •  
    Bloomberg is hosting a conference on Cybersecurity. Bloomberg is on the cutting edge of the field and they are doing a great job bringing threats into the public eye.
glenn_g

Surge of Cybersecurity Beuracracies Sparks Lucrative Opertunities - 1 views

  •  
    How we can make buckets of money due to the changing cybersecurity environment and the tools we will have to develop and be proficient with. Good stuff about the DHS in cybersecurity here
Amy Harding

U.S. business groups worried by cybersecurity law aimed at China | Reuters - 0 views

  •  
    This article talks about buying technology products from China and whether the US should. The supply chain is an important part of emerging technologies. As you worked on your bibliography - did you question where the technology comes from?
Amy Harding

UMUC Achiever Spring 2013 - 2 views

  •  
    This magazine published by UMUC is all about Cybersecurity. Thought you might enjoy reading it.
Amy Harding

Biometrics and Cyber Security - 8 views

  •  
    Review the presentation.
  • ...3 more comments...
  •  
    This article does mention balancing some weaknesses of biometrics. The one weakness that is common right now among these systems is the use of usernames and passwords to form a secondary means of accessing the system once the biometrics no longer work. With the implementation of multi-modal systems, this could be resolved. The article also discusses international based systems, which could be difficult, personal information is a source of contention between many countries. Where is the information stored, and what laws become enforceable depending on the users point of presence?
  •  
    Interesting article thank you for posting it. As Phil and the article mentioned where is this information stored. The security of this information is deeply concenring. Not that I am a conspiracy theorist but I really do not want my biometric information to be stored on some database. I remember when my daughter was young there was a push to have your child's DNA sample taken and stored in case it was ever needed in the event the child was kidnapped or lost. After thinking about it back then I just did not see how the government having her DNA sample was a good thing. Of course if she ever comitted a crime I would like to think that I would want her punished for the crime but being a parent I also know that I would do anything to protect her, so why would I give the government a readily available DNA sample for them to identify her with. In the event a sample was needed because of some terrible event happening to her one could be provided through other methods. Just my thoughts.
  •  
    I just posted up an article on fooling biometric fingerprint scanners, Facial scanners can be fooled with photos http://thehackernews.com/2011/11/android-facial-recognition-based.html The Danger is that while one can get a new password or smart card if the old is compromised, You only have one face, two eyes and 10 fingers to use for ID and can't get new ones when someone figures out how to comprimise them.
  •  
    Thanks for the posting especially since my project deals with Ambient Intelligence wherein biometrics can be an integral part of its implementation. One of the most common and frequent incidents in Service Management is authentication. Whether it is with entering secure facilities or logging into computer systems both in the office and remotely, people tend to forget their credentials. Consequently, this causes a loss in productivity as someone tries to regain their access to systems or for system administrators to provide them with temporary access. Ambient intelligence and biometrics may seem as a viable solution since the physical characteristics is intrinsic in each individual. This presentation presents me with the cybersecurity flaws and weaknesses that should be mitigated.
  •  
    Biometrics is always something I have found to be fascinating. Because like this article stated no one knows who you are on the other end of that computer so being able to authenticate that in some sort of method is a great thing
Amy Harding

Blueprint for a Secure Cyber Future - 30 views

  •  
    This document is used for your Week 1 discussion questions.
Leo T Garcia

Near Field Communications Primer - 1 views

  •  
    Here is a primer on Near Field Communications (NFC) which is a set of standards for smartphones that establishes radio communication between similar devices which are in close proximity. It is a subset for RFID (radio-frequency identification) and is being integrated into our daily lives as in most technology. The low-cost NFC tags practical uses are limited only by imagination, the challenge will be is to mitigate the cybersecurity risks it poses.
  •  
    Here is another video presentation on NFC. http://www.youtube.com/watch?v=_RBbuGwC7Eg
  •  
    I have to say this was a very interesting video to watch, and I see now how these things work and what we can do with them. I do like the fact that they have a shorter range than Bluetooth as well as less power consumption. I would still be worried about losing information when say on a crowded train or bus. People could brush up against your phone and you may not realize it. thanks for sharing. Lee
Amy Harding

Stop Fake Antivirus - 2 views

  •  
    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Amy Harding

Tools of the Trade: Exploit Kits - 1 views

  •  
    Here is a recent article that discusses additional exploit kits besides the Blackhole kit discussed in the video.
Amy Harding

Ransomware: A growing Menance - 1 views

  •  
    This malware is highly profitable, with as many as 2.9 percent of compromised users paying out.
Joseph Deleon

Cisco Secure BYOD Solution - 0 views

  •  
    Vendor specific solution to BYOD, Cisco systems.
Joseph Deleon

Exploring Bring Your Own Device In the Public Sector - 0 views

  •  
    Great article that covers the basics of BYOD and the issues this concept introduces.
Joseph Deleon

CERT Information for System Administrators - 0 views

  •  
    This is a great website that stays well informed and is known for excellent training.
Jennifer Otto

Emerging Technology in Evaluation of Nanomedicine - Molecular Pharmaceutics (ACS Public... - 0 views

  •  
    Article on emerging technology
Joseph Deleon

Applying security policies and service level agreement to IaaS service model to enhanc... - 0 views

  •  
    Great Resource no Cloud computing and a bit more technical.
1 - 20 of 22 Next ›
Showing 20 items per page