Skip to main content

Home/ Groups/ CSIA 459
Joseph Deleon

BYOD security challenges: control and protect your most sensitive data - 0 views

  •  
    General BYOD information, more data/information focused.
Christopher Salinas

Writing the Book in DNA - 0 views

  •  
    Date: Using next-generation sequencing technology and a novel strategy to encode 1,000 times the largest data size previously achieved in DNA, Harvard geneticist encodes his book in life's language There are currently 70 billion copies of the forthcoming book, Regenesis, all stored in the form of DNA.
Christopher Salinas

Rewritable digital data storage in live cells via engineered control of recombination d... - 0 views

  •  
    Department of Bioengineering, Room 269B, Y2E2 Building, 473 Via Ortega, Stanford University, Stanford, CA 94305 Edited by David Baker, University of Washington, Seattle, WA, and approved April 6, 2012 (received for review February 8, 2012) Abstract The use of synthetic biological systems in research, healthcare, and manufacturing often requires autonomous history-dependent behavior and therefore some form of engineered biological memory.
cpanagopulos

Agency Spends Millions Purging Fake Cyber Threat - 3 views

  •  
    Call it the cyber-attack that never happened. A false alarm that sent the Economic Development Agency scrambling. When the dust settled, the EDA had spent half of its information technology budget - or nearly $3 million - destroying hundreds of thousands of dollars worth of perfectly functioning computer equipment. Talk about using up your resources...literally.
  • ...1 more comment...
  •  
    Great artical. There must have been enough positive indicators for the EDA to take action. In a case like this it's better to be safe than sorry, but that doesn't make it easier to explain to tax payers!
  •  
    What stood out to me was that they did not follow the incident handling procedure. Those documents are put together for a reason. I also question why there was not a manager to oversee the incident response for something of this size. I blame management for this one.
  •  
    I agree with a better safe than sorry approach most of the time, but I have to agree with Bob that procedures weren't followed and equipment was unnecessarily destroyed.
Marie Arrington

Cloud Computing Explained - 0 views

  •  
    This was a simple video that broke down cloud computing to its simplest form. I liked how it explained the billing and information use of the concept.
Cheryl Hoffman

Car hackers 'drive' car with laptop - 1 views

  •  
    Next time you have a passenger in the back seat of your car offering infuriatingly "helpful" advice about your driving skills, count yourself lucky that they aren't doing anything more sinister in their attempts to guide your vehicle.
  •  
    I was quite amused by the picture of the man holding the Nintendo controller in the car on the front page of the article. It doesn't surprise me that a cars ECU can be manipulated. They are programmed to control specific tasks and are not complex nor secure. Most of the information they display and/or process is from various sensors within the engine or chassis. If the failure of important sensors occur, you may not even be able to start your car. It's a fragile system, although it was designed that way for safety, not system security.
Amy Harding

CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Mo... - 7 views

  •  
    For Week 6
Amy Harding

Verizon 2013 Data Breach Invesitations Report - 6 views

  •  
    For your Week 6 discussions. This is the actual report. The other bookmark takes you to an article about the report.
Rumnea Kelly

Celebrated Computer Hacker Barnaby Jack Dies - 1 views

  •  
    Interesting story that I'm sure some of you are already aware.
  •  
    I was going to post this as well. I have done a number of projects on body sensors ad telemedicine that pointed out the type of vulnerabilities he said he could exploit up to the point of death. I sad story.
Bob Lloyd

Symantec Control Compliance Suite v11 product review | SC Magazine - 0 views

  •  
    Interesting product on control compliance software.
  •  
    Eh, I like VMWare VCM or McAfee's HBSS (kind of a nightmare to set up though.)
Lee Bry

Hack an iPhone in 60 seconds - 1 views

  •  
    Check this out. Just when you think it's safe to go into the water!
Amy Harding

Big Ideas Big Data - 1 views

shared by Amy Harding on 05 Aug 13 - No Cached
  •  
    This video is for your week 7 discussion.
Amy Harding

What is IPv6? - 3 views

shared by Amy Harding on 05 Aug 13 - No Cached
  •  
    This video is for your week 7 discussion.
Cheryl Hoffman

Five Charged in Largest Hacking Scheme Ever Prosecuted in US | SecurityWeek.Com - 0 views

  •  
    The U.S. Attorney's Office today unsealed an indictment charging four Russians and a Ukrainian with a multi-million hacking scheme that netted 160 million credit card numbers from several major American and international corporations.
Bob Lloyd

3D-printed button-bashing robot guesses phone PINs | Cutting Edge - CNET News - 1 views

  •  
    I thought this was interesting. Hacking has gone to another level of automation by using robotics to brute force hack the 4 digit pin on cell phones.
  •  
    It's nice to know my first thought when I started reading this of locking the phone after X number of unsuccessful attempts is what they suggested.
Lee Bry

Cyber Threat: On the Front Lines with Shawn Henry - 3 views

  •  
    Our departing top cyber official reflects on how the FBI has adapted to an evolving threat. Shawn Henry is executive assistant director of the FBI's Criminal, Cyber, Response, and Services Branch. He served as assistant director of the Cyber Division from September 2008 to January 2010, Note: Shawn Henry retired from the FBI on March 31, 2012. This is an excellent interview with Shawn Henry describing todays cyber actors
  •  
    This is a good article. I though the FBI was smart in having IT people trained to be agents as apposed to the reverse.
Marie Arrington

Cloud Computer Security - 0 views

  •  
    This is great explanation of security threats associated with cloud computing on the 3 available options in cloud computing: Infrastructure, Platform & Application.
Marie Arrington

Six security issues to tackle before encrypting cloud data - 1 views

  •  
    Concern about security and privacy in the cloud will drive adoption of cloud encryption systems, but Gartner warns there are six security issues that businesses should tackle. The expected compound annual growth rate of software as a service (SaaS) from 2011 to 2016 is 19.5%, platform as a service (PaaS) 27.7%, infrastructure as a service (IaaS) 41.3% and security services spending 22%.
« First ‹ Previous 101 - 120 Next › Last »
Showing 20 items per page