-
Anthony Clayton Fecondo wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
paper: scanning-assignment
video: Video
-
Anthony Clayton Fecondo wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Read article here
Increased social media usage means personal information is more exposed than ever before. Fraudsters can leverage this to enable better social engineering attacks. However, employees can […]
-
Many good points Anthony. There are many steps people can take to avoid being in a situation where they will be targeted by an effective social engineering campaign. Too often I see what should be private information made public on social media. The first step of securing ones personal info, don’t post it. Don’t tell them what team you are on at work, the specific projects you are working on, or other private job related info. My company has made it part of their policy not allowing employees to even put their job description in Linkedin.
-
-
Anthony Clayton Fecondo wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Socat, a more feature-rich version of netcat has a serious security flaw. The program uses the Diffie-Hellman method to establish a key, but it uses a non-prime parameter when it should use a prime. This flaw […]
-
Using a non-prime number for security is like pretending closing a screen door protects a home. Usually having a shared workspace prevents anyone from inserting backdoors easily, but this went unnoticed for years. Maybe other developers accepted the authority of Zhigang Wang. Another possibility is that with poor management no one wants to do the tedious task of reviewing other’s code.
-
-
Anthony Clayton Fecondo commented on the post, Quiz this Week, on the site 8 years, 1 month ago
Professor,
Regarding this post, is there a quiz this week? If so, how/where do we take it? I checked blackboard, but didn’t see a quiz. -
Anthony Clayton Fecondo wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
The article is about Tor not being as anonymous as many think. Tor users can be identified through Tor’s use of DNS or by deploying a Tor sniffer at ‘internet scale.’ The article gets more in depth about how DNS […]
-
Anthony Clayton Fecondo commented on the post, Punish Companies for Cyber Security Failures, Directors Say, on the site 8 years, 1 month ago
Hey guys, thanks for all the feedback! Glad to see everyone agreeing that we need to implement a better system of enforcing cyber security standards. In all reality, making these fines heftier and forcing executives to acknowledge the cost associated with failing to comply will benefit these companies. Even if a company has to pay the fines and…[Read more]
-
Anthony Clayton Fecondo commented on the post, Your Biggest Cybersecurity Weakness Is Your Phone, on the site 8 years, 1 month ago
I think the lack of security for mobile phones is really ironic. Cell phones and even smart phones are essentially ubiquitous at this point. These devices have internet connection, cameras, microphones, CPUs, RAM, etc. They are literally miniature computers that most people have and most people store personal information on, yet the call for…[Read more]
-
Anthony Clayton Fecondo wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
This article was focused on the financial repercussions for failing to meet cyber-security requirements in the EU. Currently, failing to meet legal requirements for cyber-security results in a fine of 500,000 […]
-
I think that is a great idea, Hospitals are punished for HIPPA violations and from my experience they take HIPPA breaches extremely seriously as they are costly. Money seems to be a great motivator.
-
hello Anthony- I kind of agree with this article because some companies don’t want to spend the money in security to protect their customers and clients.
I was reading an article this morning that mentioned that a typical cost of a bridge was about $200,000 and that most cyber events cost companies less that 0.4 percent of their annual revenue researches said.
I am a stronger believer of security and the investment is worth the money.
-
Very interesting article. I share the opinion of the directors who believe that stricter punishments and standards must be applied against poor cyber security practices, especially within large corporations. I believe everyone must play their parts to encourage safer IT operations and big enterprises are no exceptions.In fact, they should take advantage of their financial and infrastructure means to display leadership in that area. 500,000 pounds is a start and hopefully it will increase substantially as predicted. I’m curious to learn about similar rules and fines in the U.S..
-
Balancing the financial equation is very important if we want companies to take security seriously. Since the company is only beholden to its stakeholders, regulations are introduced to try to forcibly balance the goals with the good of society. As companies hoard more and more personal data, penalties for losing it should increase. If a company does a risk analysis and figures out that an event is cheap enough to ignore they will never try to make data safe. Stiff penalties change the equation drastically.
-
Hey guys, thanks for all the feedback! Glad to see everyone agreeing that we need to implement a better system of enforcing cyber security standards. In all reality, making these fines heftier and forcing executives to acknowledge the cost associated with failing to comply will benefit these companies. Even if a company has to pay the fines and then reinforces their cyber security policies, that would be a lot cheaper than the cost of an actual breach. On top of that, the money from the fines can be used to enforce standards and provide more education on the importance of cyber security. I definitely believe a lot of good can come out of the stricter enforcement of cyber security standards.
-
-
Anthony Clayton Fecondo commented on the post, Biometric Skimmers Pose Emerging Threat To ATMs, on the site 8 years, 1 month ago
It’s alarming to know that even biometric authentication which is supposed to be the most secure means of authentication has its vulnerabilities. The theft of biometric information supports the assertion that nothing is ever completely secure. Even these expensive, cutting-edge biometric systems aren’t completely secure. I think it will be…[Read more]
-
Anthony Clayton Fecondo wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
The link to my written analysis: aramark-recon
The link to my presentation slides: recon-presentation
The link to my presentation recording: https://youtu.be/K2B2VxsBJTg
-
Anthony Clayton Fecondo wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
The article I read was title Vulnerability Management Technique: Managing Asset Exclusion to Avoid Blind Spots. The article can be viewed at:
The author opens the article by discussing recent advances in the […]
-
Anthony Clayton Fecondo commented on the post, Weekly Question #7: Complete by March 27, 2017, on the site 8 years, 1 month ago
I’m not comfortable with this malware. I think that creating software like this opens Pandora’s box as to the use and misuse of such software. Once one reason for intruding people’s privacy so brashly is justified, people will push for another reason why the malware should be acceptable. People already have enough to worry about with the NSA, we…[Read more]
-
Anthony Clayton Fecondo wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
The article I read was about Cato Networks which is a startup company that emerged early on in 2016. The company provides software-based networking solutions to businesses through a cloud overlay. Essentially, […]
-
Anthony Clayton Fecondo commented on the post, Article: SWIFT discloses more cyber thefts, pressures banks on security, on the site 8 years, 1 month ago
I think SWIFT definitely needs to enforce best practices for use of their product. Although SWIFT has no regulatory authority over the companies it does business with, it can make business agreements that are contingent upon the banks implementing SWIFT’s technology in a secure manner. I think this is especially important for SWIFT as the negative…[Read more]
-
Anthony Clayton Fecondo commented on the post, 911 could face its own emergency: Hackers, on the site 8 years, 1 month ago
I’m interested to know what a managed IP network is and how it would prevent a DDoS attack. The article mentioned eliminating the calling protocol that’s in use as if that would solve the problem. I know websites are vulnerable to DDoS attacks so what about managed IP network makes it so safe?
I did a little research into the matter and found…[Read more]
-
Anthony Clayton Fecondo posted a new activity comment 8 years, 1 month ago
Using an authentication system outside of a company’s organization poses several inherent threats. For one, your organization is no longer directly storing and monitoring logon credentials. While the company handling authentication most likely allows your organization input on the process and the handler is probably experienced in handling these…[Read more]
-
Anthony Clayton Fecondo posted a new activity comment 8 years, 1 month ago
The debate over the effectiveness of anti-virus software continues! Personally, I think the primary appeal of anti-virus software is the peace of mind it provides to users. Even if they aren’t really protected, the perception that they are protected goes a long way.
On a side note, I’ll share a link to John McAfee’s AMA from the netsec…[Read more]
-
Anthony Clayton Fecondo commented on the post, How Machine Learning is Making for Better IT Security, on the site 8 years, 1 month ago
Interesting article Silas. I think that machine learning and the IT staff need to work in tandem. As you mentioned, a computer’s abilities to run logic and algorithms is infinitely superior to a humans. Naturally, we should leverage machine learning to act upon its strengths. As professor Mackley mentioned, the computer will greatly increase…[Read more]
-
Anthony Clayton Fecondo commented on the post, Article: “Car hacking is the future – and sooner or later you'll be hit”, on the site 8 years, 1 month ago
This article definitely brings the risks of autonomous vehicles into the spotlight. It’s easy to focus on the marvels of self-driving vehicles, but the risks are proving formidable. I read a similar article about successful hacks against the Tesla Autopilot technology. The hackers were able to leverage spoofing techniques and jamming in order to…[Read more]
-
Anthony Clayton Fecondo posted a new activity comment 8 years, 2 months ago
Hey all,
My name is Anthony Fecondo and I graduated from Temple’s Fox School of Business in the spring of 2016. I majored in legal studies and minored in MIS. I’m currently enrolled as a full time student in the ITACS program.
I discovered MIS in my junior year and quickly became passionate about the technology industry. I wanted to pursue…[Read more]
- Load More