Skip to main content

Home/ CSIA 459/ Group items tagged Threats

Rss Feed Group items tagged

Vickye F

http://www.us-cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf - 0 views

  •  
    This website gives information about Cyber Threats to Mobile Phones. The US-CERT provides valuable information on this site concerning recent threats.
Amy Harding

Security Requirements for Cryptographic Modules - 4 views

  •  
    This standards publication (FIPS 140-2) is a key standard's document. Skim through it and see if you can find some ideas for emerging threats against the standard(s).
  • ...1 more comment...
  •  
    FIPS 140-3 is on its way and is needed as 140-2 is quite old now. Interestingly however, crypto is one of the slower moving changes in information security. Many of our algorithms have been around for many years; we have moved forward by increasing key size rather than changing the algorithms. AES and 3DES are still FIPS approved, whereas RC4 is not (which is used by many internet giants such as google and facebook).
  •  
    Any time you are allowed to introduce code into a program, you have a chance for error. By allowing cryptographic software and firmware to be updated, I think you will always have the chance for emerging threats to be introduced in the form of malware. Recently, the U.S. has stopped allowing the use of Chinese built hardware for certain DOD/ Federal agencies. if we allow the enemy to build the devices we use to form our security foundations, we have already lost the war.
  •  
    I believe the frequency of review of this policy is untimely to the speed technology advances in. If they could move the review from 5 years to 2 years will suffice. At times, once the policy is published folks are already working on the revision to keep up with technology growth. "Since a standard of this nature must be flexible enough to adapt to advancements and innovations in science and technology, this standard will be reviewed every five years in order to consider new or revised requirements that may be needed to meet technological and economic changes."
Amy Harding

Verizon's '2013 Data Breach Investigations Report' Expands Types of Threats Analyzed to... - 23 views

  •  
    For your Week 6 discussion. "Verizon's '2013 Data Breach Investigations Report' Expands Types of Threats Analyzed to Present Even Broader, More Extensive Picture of Cybercrime"
Amy Harding

http://www.safegov.org/media/46155/measuring_what_matters_final.pdf - 3 views

  •  
    Agencies must establish a unique baseline threat assessment and automate monitoring to ensure good cybersecurity, says a SafeGov report released Tuesday.
  •  
    Safegov has an interesting approach to cybersecurity. I feel the framework an effective way to approach security. Ben
  •  
    The legislation proposal aims at achieving cybersecurity due to increased network threats in government and in organizations. Educating the public and the use of cyber security technologies have great impacts on government agencies. Our government department comply with NIST and ISO/IEC, and the two bodies help in enhancing privacy and security in the national and international levels. It is important to identify efficient operational, technical and management security controls in a comprehensive computer security plan. Risk assessment in management control assists in identification of risks and in putting up risk assessment policies. Operational controls have their basis on restrictions to access information resources and in user permissions. Sam
Kerry Tam

How to mitigate smarthphone threats to your corporate network - 0 views

  •  
    As more and more people have smartphone, it can have the potential risk to an organizations security. This article has a few tips to reduce the threats.
Vickye F

Insider Threat Security Reference Architecture - 1 views

  •  
    Framework for Insider threats
cpanagopulos

IT Security Threats | Symantec - 0 views

  •  
    Excellent emerging threat resource using graphical charts displaying daily security threats, including malware, security risks, vulnerabilities, and spam.
Amy Harding

Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats ... - 22 views

  •  
    When you access this web resource you can select to download the full PDF file or you can click to read online.
Amy Harding

Stop Fake Antivirus - 2 views

  •  
    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Amy Harding

http://resources.idgenterprise.com/original/AST-0084883_2013_Threat_Report.pdf - 1 views

  •  
    2013 Threat Report
Amy Harding

How fraudulent blackhat SEO monetizers apply Quality Assurance (QA) to their DIY doorwa... - 0 views

  •  
    Scary when the criminals are fighting each other....
James Thomas

Using-SIM-for-threat-monitoring - 0 views

  •  
    This web site offers a lot of valuable information. I like it because it keeps current with emerging technologies. SIEM systems and technology enable more dynamic detection than some of the more traditional defenses.
Michael Madrzykowski

2013 Emerging Cyber Threats Report - 2 views

  •  
    Georgia Tech's security summit report
  • ...1 more comment...
  •  
    Nice find and I'm glad you posted this. On the topic of mobile malware, the report states that more smartphones were purchased in 2012 than PC's, and the Internet was accessed more on smartphones than any other device. The article mentions this, and I agree that the mobile malware threat will increase as the android and iOS ecosystems stretch wider and wider. It was also interesting to read about cloud storage, and how authorization will be one of it's major vulnerabilities as it becomes more widely used for business.
  •  
    Great article. Thing like this are very interesting to me. The section on Cloud Computing was by far my favorite. This type of technology is emerging and at the same time it has turned into a challenge for attackers to try to break. Security is going to be very vital for this service to work and more likely will be the subject of any topic related to cloud technology. Cloud service providers need to make a stronger statement and provide some type of assurance to the customer. Thanks!
  •  
    I had actually read this article before, but it was good to read it again. While they are many elements that are concerning I find the "filter bubbles" troubling. A user has the right to know that their search results have been filtered. You think you're conducting an open search, only to read this and find out your results may be limited.
Lee Bry

Cyber Threat: On the Front Lines with Shawn Henry - 3 views

  •  
    Our departing top cyber official reflects on how the FBI has adapted to an evolving threat. Shawn Henry is executive assistant director of the FBI's Criminal, Cyber, Response, and Services Branch. He served as assistant director of the Cyber Division from September 2008 to January 2010, Note: Shawn Henry retired from the FBI on March 31, 2012. This is an excellent interview with Shawn Henry describing todays cyber actors
  •  
    This is a good article. I though the FBI was smart in having IT people trained to be agents as apposed to the reverse.
cpanagopulos

Agency Spends Millions Purging Fake Cyber Threat - 3 views

  •  
    Call it the cyber-attack that never happened. A false alarm that sent the Economic Development Agency scrambling. When the dust settled, the EDA had spent half of its information technology budget - or nearly $3 million - destroying hundreds of thousands of dollars worth of perfectly functioning computer equipment. Talk about using up your resources...literally.
  • ...1 more comment...
  •  
    Great artical. There must have been enough positive indicators for the EDA to take action. In a case like this it's better to be safe than sorry, but that doesn't make it easier to explain to tax payers!
  •  
    What stood out to me was that they did not follow the incident handling procedure. Those documents are put together for a reason. I also question why there was not a manager to oversee the incident response for something of this size. I blame management for this one.
  •  
    I agree with a better safe than sorry approach most of the time, but I have to agree with Bob that procedures weren't followed and equipment was unnecessarily destroyed.
Amy Harding

Scope Of APTs More Widespread Than Thought - Dark Reading - 3 views

  •  
    Researcher uncovers hundreds of different custom malware families used by cyberspies -- and discovers an Asian security company conducting cyberespionage
  •  
    This article raises some serious questions in my opinion. As we move more into an environment where cyber warfare is to be used against different countries, where are the lines drawn between declaring war. As this article discusses, it is not as easy to see who actually was behind the attack, and an attack coming from Chinese, or some other countries IP space, is not neccessarily a state sponsored attack, nor is it neccessarily coming from someone inside the country. In a hack back scenario, it could be determined after the fact that whatever country was thought to initiate the first move, was actually a victim of a "zombie/bot" type of controlled attack that was actually initiated in another country. Can you say, Wargames? Edited 3222013: as I spoke yesterday, today guess what? http://news.yahoo.com/skorea-misidentifies-china-cyberattack-origin-071350510.html
Amy Harding

National Webcast: Cyber Security Emerging Trends and Threats for 2013 - 40 views

  •  
    This webcast is part of your Week 4 required reading/watching. Click on Archived Recording Now Available link and the video will open. On the right side of the screen you will see segments and you can click through the video and/or have to break the video down into smaller chunks.
Phil Kemp

Massive casino scam pulled off via CCTV system compromise - 4 views

  •  
    While society is looking to use technology for it's benefits, there are many pitfalls, and adverse uses for this same technology. This article discusses how the use of CCTV systems for ensuring that players do not cheat was used against the same system, to do the very thing it was protecting against. We as technology professionals should be very congnizant of the security risks that the technology we recommend or put in place, may have alternate uses, which may be used against us, and thereby causing more damage than it helped to protect.
  • ...3 more comments...
  •  
    Good article and I like the site. Haven't been there before. Looks like a good site to find out current news articles for another class I'm taking. Thanks!
  •  
    I read about the scam shortly after it happened, but the article I read didn't provide nearly as many details. Thanks for the article and I think there might be more people unemployed than just the VIP services manager.
  •  
    Phil you are so right about an organization own security technology being used against them. This is a great example of that. It is important when implementing technology to fully analyze its impact, that includes vulnerabilities and threats. A good change managment policy can help reveal problems like this. I wonder if there was an insider involved or maybe the casino failed to properly protect the network.
  •  
    Phil, This is very interesting. You would have thought the casino would have better security than that on their system. It also suprises me that if you were in a game with that much money why did they not see the receiver the person had. A simple pat down could have reveiled it. It is scary what technology can do in the wrong hands. Lee
  •  
    Winning is one thing, but stacking the deck is another. I would have thought that a casino would have a better way of securing their systems. Ben
Kerry Tam

Symbian 'vulnerability' and mobile threats - 0 views

  •  
    A study I found at UMUC's library how mobile OS are attacked by hackers and what methods they use to access OS
Jeremy Croghan

Mandiant - 0 views

  •  
    Independent security company Mandiant releases a report on one of China's cyber espionage units. The report is a little over 70 pages and describes, in detail, the five W's on an active persistent threat. The appendix also shows the tools available from the Mandiant to conduct the same type of "research". In all it is a great read.
1 - 20 of 35 Next ›
Showing 20 items per page