-
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Week 5 Reading Impressions and Question:
What makes a good, buttoned-down hack complete? One will need more than just tools. I believe in these articles, we need to think holistically throughout the […] -
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Regularly testing your technical shortfalls and security gapes by third-party vendors is always a good start if you are not sure where to start; however fancy it may be, can be daunting at times and many will […]
-
Mustafa Al Shalchi's profile was updated 9 years, 1 month ago
-
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Hello All,
A question was posed about the where to obtain the Fox School of Business Online Software Site URL; please see link below.
Enjoy.
Mustafa -
Mustafa Al Shalchi posted a new activity comment 9 years, 2 months ago
I thought this infographic would help with visualizing this elite advanced persistent threat:
http://m.v3.co.uk/IMG/818/326818/satellite-turla-russia-malware.png -
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Reading Summary –
Business Partner Vulnerability Assessment:
Business/organizations depends on the network to communicate, buy/sell, and perform all sorts of transactions. Securing organization’s nodes along […] -
Mustafa Al Shalchi posted a new activity comment 9 years, 2 months ago
-
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
At a high level, Chinese hackers executed a sophisticated attack that gave them “administrator privileges” into the computer networks at the Office of Personnel Management, mimicking the credentials of people who […]
-
Mustafa Al Shalchi commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 9 years, 9 months ago
Interesting histograms; thanks for sharing.
-
Mustafa Al Shalchi commented on the post, NIST 800 60 V1R1 Guide for Mapping Types of Information and Information Systems to Security Categories, on the site 9 years, 9 months ago
Hello,
In view of the above mentioned vulnerabilities related to open source, how good is Apple’s closed source iOS is considered?
Thanks -
Mustafa Al Shalchi commented on the post, Week 12 Materials Posted, on the site 9 years, 11 months ago
Vacca Readings:
IT security management should consist of blueprint, policies, procedures and processes to enable organizational structure and technology to protect an organization’s IT resources. The above mentioned are what ensures the CIA triad, confidentiality, integrity, and availability of IT resources.
The key to a successful ITSM…[Read more] -
Mustafa Al Shalchi commented on the post, Week 11 Materials Posted, on the site 9 years, 11 months ago
Vacca Readings
Chapter 33, 34
With the wide acceptance of cyber forensics in businesses, Federal Judges have accepted similar cyber-based evidence on the basis that it was no different from forms of evidence. The underlying evidence were still documents, business books, weighing machines, calculating machines, films, and audio tapes, etc.…[Read more] -
Mustafa Al Shalchi commented on the post, Weekly Question #7: Complete by March 27, 2017, on the site 9 years, 11 months ago
Vacca Reading
Routine use of vulnerability assessment tools along with immediate response to identified problems will alleviate this risk.
As part of the vulnerability assessment is the process of identifying and quantifying vulnerabilities in a system; one of the most important parts of identifying and quantifying vulnerabilities is…[Read more]
-
Mustafa Al Shalchi commented on the post, Weekly Question #7: Complete by March 27, 2017, on the site 9 years, 11 months ago
Vacca Reading
cellular networks are the most highly used communication network. It is also the most vulnerable, with inadequate security measures making it a most attractive target to adversaries that want to cause communication outages during emergencies.
Like all IT, RFID presents it’s own security and privacy risks that must be assessed…[Read more]
-
Mustafa Al Shalchi commented on the post, Week 12 Materials Posted, on the site 9 years, 11 months ago
N.S.A. Phone Data Collection Could Go On, Even if a Law Expires
A provision of the Patriot Act was overlooked by lawmakers and administration officials will give President Obama a possible way to keep the National Security Agency’s bulk phone records program going indefinitely — even if Congress allows the law on which it is based to expire nex…[Read more] -
Mustafa Al Shalchi commented on the post, Week 13 Materials Posted, on the site 9 years, 11 months ago
SpoofedMe attacks exploit popular websites social login flaws
The researchers at IBM’s X Force security discovered a way to gain access to Web accounts by exploiting misconfiguration in some social login services.
The experts at IBM’s X Force discovered that it is possible to gain control of accounts at various websites, including Nas…[Read more]
-
Mustafa Al Shalchi commented on the post, Progress Report for Week Ending, March 15, on the site 10 years ago
Facebook Supports Anonymity! ”
…Facebook has recently adopted and supported enhanced privacy by setting up base on the Tor Network. TOR network is one of most popular, free and untraceable networks on the net (as far as advertised).The Tor Project is a service based on free software that enables anyone running the Tor client software to…[Read more]
-
Mustafa Al Shalchi commented on the post, Progress Report for Week Ending, March 1, on the site 10 years ago
So secure chip-based credit and debit cards may not be the gold seal for securing plastic transactions…not anymore. Due to recent ‘Replay’ attacks which has been spoofing chip card charges. This is a new pattern of credit card fraud coming from Brazil. So far, reports have indicated that it has been targeting American financial institutions.…[Read more]
-
Mustafa Al Shalchi commented on the post, Progress Report for Week Ending, February 16, on the site 10 years ago
Key Points on this weeks’ assignment:
No matter what each business needs, it is important to keep DRP and BCP plans simple.
If they are kept simple, it can be followed and adopted and performed by someone other than your core personnel to ensure you have an effective plan in place. It is fine to think about RTO and RPO, but it should be a…[Read more] -
Mustafa Al Shalchi commented on the post, Progress Report for Week Ending, February 9, on the site 10 years ago
How would the original CISOs give advise to today’s security leads? So long to the days where script-kiddies deface your webpage…with today’s advanced persistent threats, CISOs will find themselves facing evolving, persistent threats from sophisticated crime syndicates, hacktivists, and larger scale state-sponsored attacks as well. Please see…[Read more]
- Load More