-
Colin P. Hanson commented on the post, Current Affairs Topics Discussion for 14 April, on the site CYBER SECURITY: BUSINESS STRATEGY AND CYBER BATTLES 10 years, 6 months ago
Most spam attacks come from PC’s. What makes this attack different is that the attacks were coming from 10.000 UNIX and Linux servers. The attack has been dubbed Windigo and has been active since 2011. The […]
-
Colin P. Hanson commented on the post, Current Affairs Topics Discussion for 14 April, on the site CYBER SECURITY: BUSINESS STRATEGY AND CYBER BATTLES 10 years, 6 months ago
The act of perpetrating a DDOS attack is not unusual anymore. Most of the DDOS attacks use 50,000 or even 100,000 bots zeroing in on their target. The most common form of the DDOS attack is to saturate the […]
-
Colin P. Hanson commented on the post, Week 14 Materials, on the site Protection of Information Assets 11 years, 6 months ago
meant to say that cyber criminals are now ot targeting the infrastructure of the internet – CPH
-
Colin P. Hanson commented on the post, Week 14 Materials, on the site Protection of Information Assets 11 years, 6 months ago
In the News:
The article I found discusses how cyber criminals are not targeting the infrastructure of the internet. They are now focusing on everything from domain naming services to certificate issuing host […]
-
Colin P. Hanson commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
Vacca Reading:
Satellite encryption, I found this section interesting. It helps to preserve vital national secrets, limits attacks on the national infrastructure and helps to eliminate security and […]
-
Colin P. Hanson commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
In the News:
DMARC: Taking a Bite Out of Phishing – This article is about the increase in phishing attacks and what is being done to prevent or intercept the attacks. DMARC, which stands for Domain-based Message […] -
Colin P. Hanson commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Vacca Reading: The benefits of a Storage Area Network (SAN) are that it usually simplifies storage administration and adds a level of flexibility since there are no cables or storage devices that need to be moved […]
-
Colin P. Hanson commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 7 months ago
In the News:
This article deals with a new spear-phishing attack that utilizes a Trojan that has been designed to target android devices. The main crux of the article is that more organizations need to be […] -
Colin P. Hanson commented on the post, Week 10 Materials, on the site Protection of Information Assets 11 years, 7 months ago
The chapter involving computer forensics was very interesting. The amount of time and attention to detail one must have in dealing with the forensic side of things is huge. The acquisition or imaging of the […]
-
Colin P. Hanson commented on the post, Week 10 Materials, on the site Protection of Information Assets 11 years, 7 months ago
In the News:
These two (2) articles I found discuss how DNS amplification or DNS reflection can be used as a DDOS attack. Basically the attacker needs to find“open” DNS servers and unleashes DNS amplification, […]
-
Colin P. Hanson commented on the post, Week 9 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Vacca Readings:
I was not very aware of how to secure a UNIX system. The security not only depended on the design concept of the system, but user and administrative practices/rights. The permissions system […]
-
Colin P. Hanson commented on the post, Week 9 Materials, on the site Protection of Information Assets 11 years, 7 months ago
In the news:
The article I found actually is sort of a follow up on my article from last week. Regarding the DDOS attacks on 6 banks on March 12th, security expert’s state that the Brobot attacks will continue […]
-
Colin P. Hanson commented on the post, Week 8 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Vacca Reading:
Chapter 5 – From the everyday user to multinational corporations it is only common sense to have a good defensive strategy against intrusions from across the internet. For the every day user at […]
-
Colin P. Hanson commented on the post, Week 8 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Six of America’s largest banks were hit with DDOS attacks on March 12th. This is the largest single day attack involving distributed denial of service attacks. According to security experts the attacks have now […]
-
Colin P. Hanson commented on the post, Week 7 Materials, on the site Protection of Information Assets 11 years, 8 months ago
Vacca Reading: I was really taken with what is needed for Threat Assessment. Creating the assessment and the committee, the planning stage and finally implementation, this is certainly not a one person job and a […]
-
Colin P. Hanson commented on the post, Week 7 Materials, on the site Protection of Information Assets 11 years, 8 months ago
This article deals with Adobe flaw exploited by the MiniDuke hackers. The flaw in Adobe has been used to hack into various governments across the EU and a few U.S. organizations. The hackers are using a highly […]
-
Colin P. Hanson commented on the post, Week 6 Materials Posted, on the site Protection of Information Assets 11 years, 8 months ago
This week I found two (2) articles about the hacker group Anonymous. The first article deal with Anonymous twitter feed getting hacked by a rival group called the Rustle League. Seems they did not practice good […]
-
Colin P. Hanson commented on the post, Week 6 Materials Posted, on the site Protection of Information Assets 11 years, 8 months ago
Hello All, Since we dicussed him yesterday, I found this interview of Kevin Mitnick done by Stephen Colbert. It’s tongue and cheek, but still interesting. […]
-
Colin P. Hanson commented on the post, Week 5 Materials Posted , on the site Protection of Information Assets 11 years, 8 months ago
Vacca Reading:
One of the things that I took away from this weeks’ reading was the business need to think more globally, in respect to their security process and procedures. Many businesses are part of the […] -
Colin P. Hanson commented on the post, Week 5 Materials Posted , on the site Protection of Information Assets 11 years, 8 months ago
In the News:
I thought these two (2) articles went hand in hand. In the first article the GAO is calling for a more comprehensive cyber security strategy from the federal government. In the past seven (7) years […] - Load More