• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Week 08: Social Engineering, Encoding and Encryption

The Top 15 Countries for Safe Data Storage

October 15, 2016 by Mengxue Ni 1 Comment

The top 15 safest nations are:

  1. Switzerland (Data risk score – 1.6 percent)
  2. Singapore (1.9)
  3. Iceland (2.3)
  4. Luxembourg (2.6)
  5. Hong Kong (3.6)
  6. Taiwan (3.9)
  7. Austria (5.2)
  8. New Zealand (5.2)
  9. Portugal (6.9)
  10. Denmark (7.6)
  11. Finland (7.6)
  12. Lithuania (7.6)
  13. Norway (7.9)
  14. Sweden (7.9)
  15. South Korea (8.3)

The benchmark identified Switzerland as the least risky nation for data storage with the lowest “potential risk score” of 1.6 percent. There is a risk map (https://www.artmotion.eu/risk-map/) which includs170 countries and shows Switzerland is the safest nation and Somalia is the least safe nation. CEO of Artmotion said: “More than ever, it is important for businesses and individuals to understand the impact that location can have on the privacy and security of their data. In the age of cloud computing, it’s easy to forget that every piece of information stored still requires a physical home, and that the geographic location of that home can have a serious impact on data privacy.”

link: http://www.securitymagazine.com/articles/87494-the-top-15-countries-for-safe-data-storage

IAEA chief: Nuclear power plant was disrupted by cyber attack

October 15, 2016 by Jason A Lindsley 1 Comment

News of another cyber attack on a nuclear power plant surfaced this week, as explained by Yukiya Amano, the director of the International Atomic Energy Agency’s (IAEA).  Amano explained that the attack happened three years ago and was disruptive, however it was not serious because it did not shut down operations.  The article discusses how serious this risk is and the need to take more precautionary measures to improve security in industrial systems.

I used to perform IT Audits of a utilities company, including their antiquated SCADA systems.  Securing these systems is very complex and challenging.  They are built to be available and have a very specific purpose to manage the energy grid.  This often makes patching and currency a major issue and introduces vulnerabilities within the environment that are ripe for exploitation, as we see in this article.

I agree with the director that we need to improve security to our critical infrastructure.  Hopefully, the industry heeds these early warning signs and begins to take significant action to improve security before it’s too late.

http://mobile.reuters.com/article/idUSKCN12A1OC

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in