Skip to main content

Home/ CSIA 459/ Group items tagged an

Rss Feed Group items tagged

Amy Harding

Scope Of APTs More Widespread Than Thought - Dark Reading - 3 views

  •  
    Researcher uncovers hundreds of different custom malware families used by cyberspies -- and discovers an Asian security company conducting cyberespionage
  •  
    This article raises some serious questions in my opinion. As we move more into an environment where cyber warfare is to be used against different countries, where are the lines drawn between declaring war. As this article discusses, it is not as easy to see who actually was behind the attack, and an attack coming from Chinese, or some other countries IP space, is not neccessarily a state sponsored attack, nor is it neccessarily coming from someone inside the country. In a hack back scenario, it could be determined after the fact that whatever country was thought to initiate the first move, was actually a victim of a "zombie/bot" type of controlled attack that was actually initiated in another country. Can you say, Wargames? Edited 3222013: as I spoke yesterday, today guess what? http://news.yahoo.com/skorea-misidentifies-china-cyberattack-origin-071350510.html
Bob Lloyd

Intelligent 'iKnife' diagnoses cancer midsurgery | Cutting Edge - CNET News - 1 views

  •  
    This article is about an intelligent knife that allows surgeons to minimize bleeding during operations but also has a mass spectrometer that analyzes chemicals when cutting. The knife has the potential to reduce tumor recurrence.
  •  
    I had read this article on the Internet and found this an amazing use of the technology. The ability to determine if an entire tumor is removed at the time it's being done eliminates risk for the patient and waiting for lab results.
Michael Austin

NFC Phones Raise Opportunities, Privacy And Security Issues - 1 views

  •  
    An article detailing the privacy concerns regarding mass implementation of NFC technology in mobile devices.
  • ...1 more comment...
  •  
    Michael, privacy is just going to become more and more of an issue as time goes on. Good post. Ben
  •  
    Michael & Ben, Did you know that iPhone 5 passed on Near-Field Communication Data Sharing while Samsung, Nokia and HTC didn't ? Article: Android Embraces, iPhone 5 Passes on Near-Field Communication Data Sharing http://www.scientificamerican.com/article.cfm?id=near-field-communication-security-purchase Sam Rios
  •  
    Hi Sam, I had noticed that the iPhone 5 wasn't using NFC. I didn't research it further though, as I honestly don't care for Apple products (way overpriced imho). There are numerous reasons Apple may not want to use NFC, which could be anything from them having a competing technology and not wanting it to prosper to them simply not seeing the value the technology in its current implementation (it is still in its infancy in some respects). I found a site which was able to list numerous reasons NFC is lagging behind: http://news.cnet.com/8301-1035_3-57441842-94/is-nfc-killing-google-wallet/ ~Mike
Brandon Kennedy

Honeypot Annotated Bibliography - 0 views

Cheryl Hoffman

Search Engine Optimization (SEO) Poisoning - 1 views

  •  
    SEO Poisoning manipulates search engine results to make sites that are malicious in nature place higher in the results list. According to the article in 2011 40% of all cyberattacks resulted from SEO poisoning.
  •  
    I know that when I'm doing a Google or Bing search, I am looking for a specific item or topic and sometimes don't even think about reviewing the link that I'm clicking on. The high amount of malware that is in search engines is scary. The pointers that were in the article were very true and very easy for the every day user to do when they are doing a search. And anyone that does not have an anti-virus or anti-malware on their system is just asking for their system to be attacked.
  •  
    I use AVG security on my laptop and it uses an add-on called link scanner. When I search, the results are rated as safe or not, with a check mark or an "X" accordingly. So you immediately know which sites to avoid. It's worth trying since this could essentially save you the time and headache of undoing malware or spyware you might contract otherwise. It's a nice "peace of mind" tool.
Christopher Salinas

Emerging Tech - Self Healing Chips - 2 views

  •  
    Research from CalTech on self healing chips. They were able to destroy chips with laser and watch as the chip recovered to near it's original state. Could have future implication for indestructible equipment in the field (i.e. DoD).
  • ...3 more comments...
  •  
    This is really interesting technology. If they figure out a way to produce this technology at a reasonable cost, this would be huge for operational security. Like anything else, if this becomes possible to mass produce, the cost will inevitable drop over time, enough for the cost-benefit ratio to make sense to implement in a variety of hardware. Nice find!
  •  
    CalTech's self-healing chips are truly an amazing step into the future. The technology alone is unbelievable. Once this technology is fully tested and developed it could be used in many different ways, such as part of the space station, pace makers, insulin pumps, etc. It is a very exciting discovery.
  •  
    The self-healing integrated chips is an ingenious solution! This amazing invention will definitely be applied to other systems when the research work is successfully completed. The real concern for me is if there is an unknown adverse effect that its implementation may bring about.
  •  
    Funsho, Adverse as in the machines rising up?
  •  
    My sentiments exactly!
Amy Harding

Biometrics and Cyber Security - 8 views

  •  
    Review the presentation.
  • ...3 more comments...
  •  
    This article does mention balancing some weaknesses of biometrics. The one weakness that is common right now among these systems is the use of usernames and passwords to form a secondary means of accessing the system once the biometrics no longer work. With the implementation of multi-modal systems, this could be resolved. The article also discusses international based systems, which could be difficult, personal information is a source of contention between many countries. Where is the information stored, and what laws become enforceable depending on the users point of presence?
  •  
    Interesting article thank you for posting it. As Phil and the article mentioned where is this information stored. The security of this information is deeply concenring. Not that I am a conspiracy theorist but I really do not want my biometric information to be stored on some database. I remember when my daughter was young there was a push to have your child's DNA sample taken and stored in case it was ever needed in the event the child was kidnapped or lost. After thinking about it back then I just did not see how the government having her DNA sample was a good thing. Of course if she ever comitted a crime I would like to think that I would want her punished for the crime but being a parent I also know that I would do anything to protect her, so why would I give the government a readily available DNA sample for them to identify her with. In the event a sample was needed because of some terrible event happening to her one could be provided through other methods. Just my thoughts.
  •  
    I just posted up an article on fooling biometric fingerprint scanners, Facial scanners can be fooled with photos http://thehackernews.com/2011/11/android-facial-recognition-based.html The Danger is that while one can get a new password or smart card if the old is compromised, You only have one face, two eyes and 10 fingers to use for ID and can't get new ones when someone figures out how to comprimise them.
  •  
    Thanks for the posting especially since my project deals with Ambient Intelligence wherein biometrics can be an integral part of its implementation. One of the most common and frequent incidents in Service Management is authentication. Whether it is with entering secure facilities or logging into computer systems both in the office and remotely, people tend to forget their credentials. Consequently, this causes a loss in productivity as someone tries to regain their access to systems or for system administrators to provide them with temporary access. Ambient intelligence and biometrics may seem as a viable solution since the physical characteristics is intrinsic in each individual. This presentation presents me with the cybersecurity flaws and weaknesses that should be mitigated.
  •  
    Biometrics is always something I have found to be fascinating. Because like this article stated no one knows who you are on the other end of that computer so being able to authenticate that in some sort of method is a great thing
samuelrios

Court Says C.I.A. Must Yield Some Data on Drones - NYTimes.com - 3 views

  •  
    Article supports drones as being an emerging technology. ASSignment1, Part1 Support
  •  
    Interesting article, It seems to me that this is just another one of those cases about flexing the "muscle" of the Freedom of Information Act. In my opinion it is pretty common knowledge that targeted drone strikes are being used to eliminate enemies; so why is it so important here that the C.I.A. has to acknowledge these attacks? What would that accomplish? The media outlets already report on successful drone strikes and now there are even military medals to recognize drone pilots. http://www.fsunews.com/article/20130318/FSVIEW0303/130317001/New-military-medal-stirs-controversy-?odyssey=mod|newswell|text|frontpage|s
  •  
    I just wonder how long it's going to take before something comes out of these attacks. Using these drones to fly into other countries like Pakistan, and "take out" suspected enemies is pretty borderline in my opinion. If this were to happen in America, we would certainly not stand for it, and would declare war on the country that carried out the action. Pushing the button from California on a drone missle is alot like conducting cyber warfare from one country to another. The damage that can be done is becoming greater and greater every day as technology is starting to tie together national infrastructures. In my opinion, drones are the some of the first of the cyber warfare machines.
Shondre Fort

Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - 0 views

  • Schlenoff and his colleagues used their SCORE approach to evaluate technologies as they progressed under two DARPA programs: ASSIST and TRANSTAC. In ASSIST, DARPA is funding efforts to instrument soldiers with wearable sensors—video cameras, microphones, global positioning devices and more—to continuously record activities while they are on a mission. TRANSTAC is driving the development of two-way speech-translation systems that enable speakers of different languages to communicate with each other in real-world situations, without an interpreter. By providing constructive feedback on system capabilities, the SCORE evaluative framework helps to drive innovation and performance improvements.
  •  
    SCORE (System, Component and Operationally Relevant Evaluations) is a unified set of criteria and software tools for defining a performance evaluation approach for complex intelligent systems. It provides a comprehensive evaluation blueprint that assesses the technical performance of a system and its components through isolating and changing variables as well as capturing end-user utility of the system in realistic use-case environments. The SCORE framework has proven to be widely-applicable in nature and equally relevant to technologies ranging from manufacturing to military systems. It has been applied to the evaluation of technologies in DARPA programs that range from soldier-worn sensor on patrol to speech-to-speech translation systems. It is also currently being applied to the assessing the control of autonomous vehicles on a shop floor.
  •  
    From NIST Tech Beat: June 21, 2011 Most industry executives, military planners, research managers or venture capitalists charged with assessing the potential of an R&D project probably are familiar with the wry twist on Arthur C. Clarke's third law*: "Any sufficiently advanced technology is indistinguishable from a rigged demo."
samuelrios

HowStuffWorks "How the Predator UAV Works" - 0 views

  •  
    Military commanders use tactics and strategy in combat to inflict as much damage on the enemy while trying to risk as few personnel and resources as possible. This principle was at the heart of the development of the RQ-1 and MQ-1 Predator Unmanned Aerial Vehicle.
  •  
    This was a really cool read, before I read your article I did not even know what the predator UAV was. Thanks for this great information.
  •  
    I always use HowStuffWorks if I read an article about a new technology and don't understand how it works. UAVs is an area where most people don't understand how it works. Nice article.
Phil Kemp

Massive casino scam pulled off via CCTV system compromise - 4 views

  •  
    While society is looking to use technology for it's benefits, there are many pitfalls, and adverse uses for this same technology. This article discusses how the use of CCTV systems for ensuring that players do not cheat was used against the same system, to do the very thing it was protecting against. We as technology professionals should be very congnizant of the security risks that the technology we recommend or put in place, may have alternate uses, which may be used against us, and thereby causing more damage than it helped to protect.
  • ...3 more comments...
  •  
    Good article and I like the site. Haven't been there before. Looks like a good site to find out current news articles for another class I'm taking. Thanks!
  •  
    I read about the scam shortly after it happened, but the article I read didn't provide nearly as many details. Thanks for the article and I think there might be more people unemployed than just the VIP services manager.
  •  
    Phil you are so right about an organization own security technology being used against them. This is a great example of that. It is important when implementing technology to fully analyze its impact, that includes vulnerabilities and threats. A good change managment policy can help reveal problems like this. I wonder if there was an insider involved or maybe the casino failed to properly protect the network.
  •  
    Phil, This is very interesting. You would have thought the casino would have better security than that on their system. It also suprises me that if you were in a game with that much money why did they not see the receiver the person had. A simple pat down could have reveiled it. It is scary what technology can do in the wrong hands. Lee
  •  
    Winning is one thing, but stacking the deck is another. I would have thought that a casino would have a better way of securing their systems. Ben
paksingtham

Growing Data Security Concerns to Drive Global Market for Keystroke and Typing Dynamics... - 4 views

  •  
    I can't see this being used much for single factor authentication, but I could certainly see it being used on top of a username/password setup to bolster the security of that password. Another useful application for this would be to augment an anomaly based IDS running on the user's system. If keystroke patterns/dynamics exceed standard deviation, an alert could be sent to the help desk or security, who could then verify the identity of the user.
  •  
    I could see some companies implementing keystroke and typing dynamics depending on their sector and security posture. However, depending on the sensitivity of the software, they could receive a lot of false positives. I've personally noticed my typing speed fluctuates drastically depending on the time of day. Nevertheless, I could see more companies deploying the software depending of their budget.
  •  
    It seems that there are way to many variables for this technology to really take off. I agree with trevor that there is potential for a high volume of false positives. I also see potential for a high volume of false negatives. This technology seems as though it could end up being extremely frustrating for the end user.
Amy Harding

http://www.safegov.org/media/46155/measuring_what_matters_final.pdf - 3 views

  •  
    Agencies must establish a unique baseline threat assessment and automate monitoring to ensure good cybersecurity, says a SafeGov report released Tuesday.
  •  
    Safegov has an interesting approach to cybersecurity. I feel the framework an effective way to approach security. Ben
  •  
    The legislation proposal aims at achieving cybersecurity due to increased network threats in government and in organizations. Educating the public and the use of cyber security technologies have great impacts on government agencies. Our government department comply with NIST and ISO/IEC, and the two bodies help in enhancing privacy and security in the national and international levels. It is important to identify efficient operational, technical and management security controls in a comprehensive computer security plan. Risk assessment in management control assists in identification of risks and in putting up risk assessment policies. Operational controls have their basis on restrictions to access information resources and in user permissions. Sam
Seth Molin

A suggestion for future research on interface design of an internet-based telemedicine ... - 1 views

shared by Seth Molin on 01 Apr 13 - No Cached
  •  
    Article 5 from UMUC library
Dan Schulman

Kill the Password - 1 views

  •  
    An article many of us have probably read, but an important one for my paper
Amy Harding

U.S. business groups worried by cybersecurity law aimed at China | Reuters - 0 views

  •  
    This article talks about buying technology products from China and whether the US should. The supply chain is an important part of emerging technologies. As you worked on your bibliography - did you question where the technology comes from?
Phil Kemp

Hacker says phone app could hijack plane - 0 views

  •  
    Interesting article about an app that has been specifically designed to take control of an airplane.
sarahterry

Biometric Fingerprinting for Visa Application: Device and Procedure Are Risk Factors fo... - 0 views

shared by sarahterry on 07 Jul 13 - No Cached
  •  
    Biometrics - Fingerprinting. This source is an example in what companies, government entities as well as products are taking finger prints from people who are applying for credit card, crossing the boarder and how it has stream-lined their process.
Justin Ohm

Cognitive biometrics: A very personal login - 2 views

  •  
    Retina and iris scans, fingerprint and palm logins rely on possession of unique anatomical characteristics that you cannot forget as you might a password. But, Kenneth Revett of the British University in Egypt, in El-Sherouk City, reviews the state of the art in an alternative approach to user authentication in the inaugural issue of the International Journal of Cognitive Biometrics.
  •  
    Very interesting article Justin. I like the idea of using biometrics as an authentication layer, vs. relying on a CA to issue digital certificates. In my opinion, biometrics should only use functions that can be read or measured when the person is alive.
  •  
    Biometrics is great for a multi factored authentication. It is a very expensive approach to authenticating as well. I doubt there will be a market for it until the price for implementation drops drastically. I would not use it as a stand alone authentication approach.
cpanagopulos

Memory Implants - 7 views

  •  
    Theodore Berger, a biomedical engineer and neuroscientist at the University of Southern California in Los Angeles, envisions a day in the not too distant future when a patient with severe memory loss can get help from an electronic implant. In people whose brains have suffered damage from Alzheimer's, stroke, or injury, disrupted neuronal networks often prevent long-term memories from forming.
  • ...3 more comments...
  •  
    That is awesome!!! Johnny Mnemonic is coming sooner than expected. I watched a grandfather suffer through Alzheimer's. It would be amazing if this could treat such a horrible condition.
  •  
    This is pretty amazing stuff! It would be wonderful if this could actually brought to practical application. We are slowly losing my mother-in-law to dementia or Alzheimer's and it's a terrible process. Losing memories of people is bad enough, but she has lost the ability to perform self-care functions.
  •  
    The fine line between "Crazy" and "Visionary" seems to be demonstrated with this developing technology. Being able to map and store long-term memories in an ailing brain seems remarkable. Achieving this not through drugs or some form of conventional treatment but rather through a silicone chip implanted in the brain is outstanding. I'll be interested in seeing where this development goes.
  •  
    WO!!!! Shut the front door this article is like a science fiction read but the technology if approved for humans can have a dramatic impact on folk who have family members with dementia/Alzheimer as this can possibly make life less stressful for caregivers. It would be nice to see parents and grandparents not have to suffer this dreaded disease if science and technology can provide solution. But I would like to have one myself as I can get all the help I can for TOTAL RECAL!!!
  •  
    Wow, this is crazy. I don't know if I should be terrified or excited. This reminds of the old movie Jonny Mneumonic in the 90s. All these new sciences are great. The only problem that I have is bad people getting a hold of such technologies to exploiting weaker humans. I'm thinking along the line of putting false memories into people's brain and turning them into someone that they are not.
1 - 20 of 104 Next › Last »
Showing 20 items per page