-
Ahmed A. Alkaysi commented on the post, To Antivirus or not to Antivirus, on the site 8 years, 2 months ago
I made a habit of installing Avast anytime I do a fresh install of Windows or build a new computer. I can’t remember the last time I actually ran a scan using it though. Most of the time, when ever there is a malicious file trying to be downloaded or trying to access a high threat site, Chrome is doing the blocking for me. I think for now, I will…[Read more]
-
Ahmed A. Alkaysi posted a new activity comment 8 years, 2 months ago
There should be Government surveillance conducted to an extent. The Government shouldn’t have the ability to use any of these tools willy nilly. It worries me that these private companies are selling their tools to countries around the world. This has become a profitable industry spurring even more competition. We will eventually see these tools…[Read more]
-
Ahmed A. Alkaysi commented on the post, Progress Report for Week Ending, March 15, on the site 8 years, 2 months ago
Between accessing different apps at work and various accounts/websites at home, managing all these passwords has been a pain. I am guilty of not being very creative when it comes to password creation. It’s just so hard to manage all of them, and I don’t trust any app to manage them for me. At work, I ended up creating a notepad with the list of my…[Read more]
-
Ahmed A. Alkaysi commented on the post, Progress Report for Week Ending, March 1, on the site 8 years, 2 months ago
Very interesting article. I know a lot of sports team these days are investing heavily into data and analytics. The Phillies for example hired an ex-Google employee to run their baseball statistics program and invested over a million dollars in a data analytics system. Now that more teams are moving towards evaluating potential players using…[Read more]
-
Ahmed A. Alkaysi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 2 months ago
I found this article from this morning pretty interesting. SWIFT, which basically allows financial transactions between banks worldwide, declared that their were new cyber attacks on its member banks. They said t […]
Ahmed,
This is a classic example of one of this week’s readings where an organization fails to apply its due diligence to properly vet business partners. As it is stated it SANS’ article, “Using Open Source Reconnaissance Tools for Business Partner Vulnerability Assessment,” IT security is not only about aligning an organization with the most sophisticated IT Security tools, but also must legally and ethically investigate how secure are vendors and business partners. In order to efficiently accomplish so, open source tools such as search engines, Shodan, Search Diggity, and Recon-ng can provide a company security profile without directly accessing target firms,” stated SANS’ Susanne Young. This is a lesson that SWIFT will need to learn the hard way, but can be prevented in the future if apply the principle explained above.
I think SWIFT definitely needs to enforce best practices for use of their product. Although SWIFT has no regulatory authority over the companies it does business with, it can make business agreements that are contingent upon the banks implementing SWIFT’s technology in a secure manner. I think this is especially important for SWIFT as the negative publicity that the compromised banks receives will also affect SWIFT’s reputation. If SWIFT becomes less reputable, banks in business with SWIFT and potential clients might take their business elsewhere. Definitely something SWIFT needs to address ASAP.