Weekly questions to consider when creating your posts. These questions are a jumping off point to asking your own questions, pose new ideas, and provide explanations and examples backed by careful analysis. Apply class concepts, terms, and theories too. Refer to Assignment 12 for additional details.
- What is threat modeling?
- What are some regulations involved with data protection and cybersecurity?
- What is Ransomware, and why are hospitals often targeted?
- What are some methods to protect yourself online?
- What are the three types of artificial intelligence, and what are some examples of each?
- Who is Alan Turing, and what is the Turing test used for?
Ajibola Sode says
What are some methods to protect yourself online?
To enhance your online protection, use strong and unique passwords, enable two-factor authentication, keep software updated, be wary of phishing attempts, use antivirus software, secure your home network,limit personal information sharing, secure mobile devices, backup data, be cautious with downloads and attachments, and educate yourself about online risks. These practices can reduce your risk of becoming a victim of cyber threats.
Eduard Lagutin says
Hello Ajibola,
I like the examples and methods that you listed to protect yourself better online. Especially 2FA. Many people do not take online protection seriously and allow themselves to be easy targets for online crime. Great job.
Regan DeShazo says
Great Response i also added; Utilizing virtual private networks (VPNs) can protect data by encrypting internet connections, enhancing privacy. It is advisable to stay informed about the latest cybersecurity threats and to educate oneself on best practices for online safety to mitigate risks effectively.
Ajibola Sode says
Routinely saving copies of your data offers a safety net for retrieving vital information if you’re targeted by a cyberattack, like ransomware. Exercising discretion with the downloads and email attachments you access helps avoid inadvertently allowing harmful software onto your device.
Continuously updating your knowledge on the evolving landscape of online threats is crucial. This involves keeping abreast of emerging scams, adopting recommended online security measures, and familiarizing yourself with the privacy configurations and terms of service of the digital platforms you engage with.
Incorporating these strategies into your routine digital interactions can greatly diminish the likelihood of encountering cyber threats, thereby promoting a more secure and protected online environment.
Hawa Barry says
Hi Ajibola, this is a great point you bring up, not only for cybersecurity purposes, but for storage as well. It’s impossible to know when information can be lost if it’s not properly backed up, and saving copies of data certainly provides an extra blanket of security.
Darren Nolan says
Post
What are some methods to protect yourself online? Well there are many ways you can protect yourself online. One just be careful, if you get spam mail DO NOT click on links they are most likely not what they say they are and will probably either steal your information or give you a virus. Another way to protect yourself is about social media. If you dont want people to know something dont post it. Use you common sense and DONT POST IT. Now for technological things a VPN. A VPN is a program you can download so you can change the location that your Wi-Fi says you are so people can’t hack or dox your Wi-Fi. Doxing mean someone sends a ton of traffic to your Wi-Fi router so it either doesn’t work anymore or barley works and they can do this for however long they want.
Eduard Lagutin says
What are the three types of artificial intelligence, and what are some examples of each?
The three types of artificial intelligence is,
– Artificial narrow intelligence (ANI) has a narrow range of abilities, typically used for singular tasks
– Artificial general intelligence (AGI) is on par with human capabilities
– Artificial superintelligence (ASI) is more capable than a human
Some examples of ANI are facial recognition, searching the internet, and speech recognition.
An example of AGI would be robot labors or assistants who can think and act within themselves.
An example of ASI would be Skynet from Terminator or HAL 9000 from 2001: A Space Odyssey where they are fully autonomous and can make any decision they feel they want to make and are way more capable than a human can be.
Zarmina Khan says
Hi Eduard,
Well said about what the three AI types as well as providing examples of each. As we evolve as humans, it’s interesting to see how AI has really advanced as well as escalated within the past 10-15 years. Watching movies about it in the early 2000’s or 2010’s and now we can be apart of it is wild.
Leanne Sheely says
That’s really good to know I didn’t realize there were different types of AI. It’s crazy how humans can create something like ASI that is even smarter than us humans.
Ajibola Sode says
Hey Leanne,
There are many types of AI, including ASI, which is smarter than humans.
Samir Lagouit says
Hi Eduard,
I enjoyed your response and specifically your mention of ANI facial recognition. It’s been interesting to learn about facial recognition and how it enters every part of our society now. There are bars you can get drinks through this software and events where you can get in just off facial recognition. This has been done in the NFL, MLB, and MLS through wicket, known as facial ticketing.
Regan DeShazo says
What are some methods to protect yourself online?
Ensuring online safety involves adopting various proactive measures. First and foremost, robust and unique passwords for each online account bolster security; using a mix of upper and lowercase letters, numbers, and symbols enhances their complexity. Employing multi-factor authentication adds an extra layer of defense by requiring an additional verification step, often through a mobile device. Regularly updating software, including antivirus and anti-malware programs, is crucial to patching vulnerabilities. Practicing discretion while sharing personal information online, being cautious with email attachments and links, and avoiding suspicious websites contribute to safeguarding against phishing attacks and malware. Utilizing virtual private networks (VPNs) can protect data by encrypting internet connections, enhancing privacy. It is advisable to stay informed about the latest cybersecurity threats and to educate oneself on best practices for online safety to mitigate risks effectively.
Zarmina Khan says
Hi Regan, protecting yourself online is so important and you described it so well. Not only is it about your self image, but it’s the image that you seek to leave for your entire life and then some. Along with the health of the system you are using, updating when needed, it’s like taking care of a car. As a car lover, keeping up appearances, like keep my car clean outside and inside, as well as routine oil changes and tire rotation is key to a long life for a car, as that can be said for understanding how much is needed to effectively protecting yourself online.
Danylo Pidkova says
Hi Regan,
You brought up a very important and useful topic. Staying safe online is vital and is a must nowadays. Great advice you give on enabling multi-factor authentication. 8-symbol passwords can now be cracked within minutes, s0 adding an extra layer of protection to safeguard your personal information from hackers is always a good idea. I also often use VPN to protect my data and enhance privacy.
Mahbuba Ahmed says
********Hi Regan,********
They were great advice for online safety, creating strong passwords, staying cautious with personal information are practical steps for a more secure online experience. Regular updates and the VPN also add an extra layer of security and staying informed about cybersecurity threats is a key.
Darren Nolan says
These are great methods to protecting yourself online and I will definitely be using some of these thanks!!!!
Zarmina Khan says
What is threat modeling?
Threat modeling is a structure approach to identifying, mitigating, and assessing security risks in any system or application. Usually a proactive process, used in IT the evaluate potential threats and vulnerabilities that could compromise confidential information. There are key steps in understanding how this process works. First you have to define the system, including understanding the components, data flows, and interactions in the system. Next you need to identify assets and resources that would be critical and protecting the most important pieces in the system. Identity threats is next and then they need to assess the risk which involves assigning the risk level to each threat and scoping out the most important one. Along with prioritizing mitigation strategies, and documenting the entire process as well as system issues for future stability.
Georgios Zisis says
Hi Zarmina,
I think it is important to also mention that this does not pertain to just companies but each person can think about their own threat model. Protecting yourself is very important so doing a threat model is a great way to assess what data you need to protect and who to protect it from.
Danylo Pidkova says
Who is Alan Turing, and what is the Turing test used for?
Alan Turing was a British mathematician, logician, and computer scientist who is considered one of the founding fathers of modern computer science. He made significant contributions to various fields, including cryptography, artificial intelligence, and theoretical computer science. Turing is best known for his work during World War II, when he played a crucial role in breaking the German Enigma code, helping to shorten the war.
In 1950, he proposed the Turing test, a way to measure a machine’s intelligence. The test involves a human judge having conversations with both a human and a computer without knowing which is which. If the judge can’t tell which participant is the computer, then the computer is considered to have passed the Turing test. The Turing test is important because it helps us to see if computers can communicate and behave intelligently like humans.
Off Topic: There’s a great movie about Alan Turing’s life called “The Imitation Game” starring Benedict Cumberbatch and Keira Knightley.
Juan Delgado says
Hi Danylo,
I thought your post was very compelling. Before this class, I never heard of Alan Turing but hearing this for the first time made me interested in his life. I want to learn more about his life and what he had to go through. I also liked how you gave a movie recommendation since I might check out the movie. Overall, I thought you did a very good job.
Corey Reagan says
Its amazing to go back and look at all the impressive inventions and discoveries made during WW2 and that time period. He was truly an innovator and ahead of his time.
Leanne Sheely says
What are some methods to protect yourself online?
You need to be making sure you are protecting your online self. This could be any data you have online or any passwords or any type account. Including especially your bank accounts or anything that your debit or credit card is linked up to. Since people can so easily hack you people that actually want to help people have created ways for you to help protect yourself online. There are identity theft protection software such as Norton 360, Bitdefender, McAfee, IDShield, and I’m sure many more. These types of software just help you protect your online self. An easy way of protecting yourself is making your passwords harder and not the same password you use for everything. Yes I know it is really hard to come up with harder passwords that are also easier for you to remember but that could help you from getting hacked. Hope this helps and good luck against the hackers!
Dana Persaud says
Hey there, great references! Protecting yourself online is always important. Identity theft is a big problem that is easily preventable. It always important to protect yourself because of new technology constantly emerging. New technology also includes new ways to steal information and a lack of regualtion.
Elena Grigoryan says
Ransomware is type of malware that blocks access to data until a ransom is paid, hence the name ransomware. Access is blocked, data is encrypted, and decryption key is only released after payment has been made. Ransomware is popular because many times, especially for businesses, it’s easier to pay the ransom and gain back the access, then have limited or no access to important business data for any period of time. Hospitals are a great target because they rely on technology very heavily, and therefore are more exposed to malware than companies doing business with pen and paper (if such businesses still exist at all). Hospitals also have a lot of very sensitive and personally identifiable information stored, such as medical and financial data, SSNs, addresses, DOBs, phone numbers, etc. Breach into such data can cause major problems for the business, examples being damaged reputation, loss of clients, financial and even legal issues, and so on.
Maurice Chism says
My doctors office recently advised how they were unable to schedule an appointment for me because their system was hacked. Then it was mentioned that the hackers were holding the system hostage until they paid xxx amount of money. This is really concerning because you have no idea of how many people might have been turned away because they were unable to see a doctor. Then if you have some very important people how may use that office, is their information being used against them for various reasons. So it is important that these organizations and ourselves pay close attention to our credit reports, bank statements or other resources that has our information.
Juan Delgado says
What are some methods to protect yourself online? One method that you can protect yourself online is you make stronger passwords. When you make stronger passwords, then people won’t be able to guess and hack into those accounts. Also, you can set up a two-factor authorization. Two-factor authorization is after you login into your profile you would have to go to another app to say that it’s you. It would just be harder for hackers to hack you. Even if the hacker gets logged into your account, you can still say that it wasn’t you and then the hacker won’t be able to get in that account. Another method that you can protect yourself online is to not just click on links that get sent to you. Always try to check the email to see if it’s an accurate account. If it’s not then that would mean that the email was trying to hack you. Always try to check to email sounds accurate to see if the email is for you or just trying to hack you instead.
Elena Grigoryan says
2 factor authentication is a great way to add a layer of security! I have also recently downloaded an app called “Duo Mobile” per Facebook suggestion to strengthen security. I was looking into it because I CONSTANTLY get emails with codes for password reset on Facebook, so someone is always trying to get in.
M'Kyah Graham says
These are very effective methods to protect your online identity and assets. To contribute to your post, we may also consider the methods we practiced in class. There are websites that can tell you whether your emails have been breached, and tell you the strength of your passwords. There are also websites that manage and protect all of your passwords.
Maurice Chism says
What are some methods to protect yourself online?
You can protect yourself by not being on line…. Seriously, because everything is internet based we really need to be cautious of how our information is retrieved, seen etc. First, I would review my passwords for my banks, emails or anything that has pertinent information to my livelihood. Then I would register for some type of monitoring system for my precious information like banking information. I would try to stay on a schedule of changing my passwords consistently.
Cristina Valentin says
Hi Maurice,
You’re right, if only things didn’t have to be online. Unfortunately, that’s the way things are and so many applications are cloud based that it is virtually impossible not to interact with the internet in some may. Keeping up with updating passwords is definitely a good way to help protect yourself.
Madison Masino says
Hi Maurice,
I agree that the best way to protect yourself is not being online however social media is so prominent in today’s society that people can even make a living off of it so I feel as if it’s hard to go off of social media completely.
My boss is in his 60’s, has never made social media accounts let alone an email and I think it’s pretty cool he decides to continue living without it vs. giving in to the new societal norm.
Georgios Zisis says
Surprisingly, there are very few federal laws for data protection in the U.S. This means that secure data protection is up to each state to provide. In the US Data privacy article, there is a picture of the U.S and how many data privacy laws are enacted in each state. Only 19 states have even a single law passed. If you live in any of the other 31 states, you have to depend on the few Federal Laws that exist. The problem is that they are very specific about what they protect, so these outdated laws do not stack up to the technology and security needed to keep people’s data safe. It seems that the EU has set the gold standard on data protection with the General Data Protection Regulation (GDPR). The GDPR has strict code that companies need to comply with to operate in Europe. The GDPR grants EU citizens several important rights. To highlight a few of these rights; a company cannot process someones personal data without getting explicit consent and a user can choose to have ALL of their data deleted, and the company has to comply. A question to leave you off on, why has the U.S. not done that same yet?
Cheyanne Kostaras-Nesbitt says
Hi Georgios.
I agree that digital security in the US is a problem. Technology is changing too fast for our legal system to keep up with. It is shocking to me that not even half of US states have laws regarding data privacy. I think the EU is way ahead of us when it comes to data privacy laws, and the US should follow in their footsteps toward better protection.
Cristina Valentin says
What is threat modeling?
Threat modeling is taking a step back to asses what you would need to implement to protect information. It would all depend on what type of information you are trying to store and use. If it a business that deals with highly personal information for clients, then you would need to ensure to implement firewalls, passcodes and 2 step verification processes. However, if it was something more mundane such as a personal email account, then you can select a password that is more difficult. It is important to accurately asses your needs, because you also don’t want to implement more than is necessary and make everyday tasks more difficult to access for yourself.
Cheyanne Kostaras-Nesbitt says
Who is Alan Turing, and what is the Turing test used for?
Alan Turing was a British mathematician who became known as the father of modern computer science for his invention of the Turing Machine. He was able to decipher Nazi codes during World War II. He developed the Turing Test, which tests the intelligence of a computer. In order for a computer to “pass” the test, a human judge must be unable to determine if the computer is a computer or a human responder. The test asks a series of questions and analyzes the responses, assuming computers will be unable to successfully answer. The test uses questions that contain emotional concepts or analogies. The idea is that a computer will be unable to answer the emotional questions and take the analogies too literally and give an illogical (or overly logical) answer.
Briana Seidle says
Hey Cheyenne,
This was a great explanation of Alan Turing and what the Turing test is for. It can be difficult for me to remember names and what they created and why, but your explanation was very helpful.
Dana Persaud says
How to protect yourself?
In order to protect yourself from having data stolen, getting a security antivirus, or an ad blocker might be helpful. Also keeping back up files and disabling macro are useful. Simple security measures also include firewalls, vpns, and not to open any random attachments or links.
Protecting yourself is very important and can save you from having your personal information leaked and your financial information leaked. Cases like these can end up in fraud or stolen identity.
Jenna Oldroyd says
Hi Dana,
I answered the same question! I failed to mention using firewalls and VPNs in my post. They are great ideas to help protect yourself online. Many companies and organizations are switching to VPNs, making it more difficult for systems to be hacked.
Jenna Oldroyd says
What are some methods to protect yourself online?
It is essential to take the necessary actions to protect yourself online. Without protection, anyone can gain access to your personal and financial information. In doing this, it is easy to steal your identity and invade your privacy.
Some methods to protect yourself online include creating strong passwords, monitoring your children, securing your internet connection, and being cautious of email scams. To help remember your passwords, there are apps that you can use to store all of your passwords safely. It is also important to keep your personal information personal, which means being careful of what you present on social media.
Rachel Bard says
I know that having an application hold all your usernames and passwords has become the norm, but do you ever wonder if let’s say you have Google keep track of your usernames and passwords and they one day get hacked? Then all the unique passwords go to waste. I do think a secondary confirmation is one of the best ways to protect yourself online.
Briana Seidle says
What is Ransomware, and why are hospitals often targeted?
Ransomware is a type of malware that locks and encrypts its victims devices, systems, and data, rendering them from having access or use their technology until the attacker receives a ransom payment.
Ransomware can occur in six stages:
1. Distribution and Infection
2. Command and Control
3. Discovery and Lateral Movement
4. Malicious Left and Encryption
5. Extortion
6. Resolution
Hospitals are often targeted due to it’s constant retrieval and storage of personal information of its patients and staff. Hospitals tend to file documents with their patients social security numbers, residential information, account information and more. This is the ideal target for Ransomware attackers, as it’s considered a one-stop shop for their schemes.
Hamida Akther says
Hi Briana,
You gave a great answer to what is Ransomware, and why are hospitals often targeted. Your explanation was clear, and easy to understand. I agree the since hospital have valuable data about patients and staff that why it makes it an easy target.
Rachel Bard says
Who is Alan Turing, and what is the Turing test used for?
Alan Turing was one of the originators of what we know today as artificial intelligence. He helped crack Nazi codes during World War 2, that at the time were deemed un-crackable. As a result of his mind and creations we now have the Turing Test. The Turing Test, also known as the imitation game (also the name of the 2014 film based off of the code-cracking events) is a test to basically determine if a machine can pass as a human. If there was a human talking to a a curtain and behind one curtain was a computer and the other a human, the human having the conversation has to determine which is human and which is computer. If the computer can “trick” the human into believing it is also a human, then the machine “passes” the Turing Test. I did do some research to see if any machine had passed the test and apparently in 2014 (personally find it ironic it passed the test the same year the imitation film came out) a machine called, Eugene Goostman, convinced 33% of evaluators that it was a 13-year-old Ukrainian boy. My research also concluded that Chat GPT 4 has not passed the Turing Test.
Lesly Puma Vinansaca says
Hi Rachel
Awesome explanation of who Alan Turing was and what the Turing Test is. I enjoyed how you included further researched if any machine had passed. It’s very interesting how Eugene Goostman passed of as a 13 year old Ukrainian boy.
Mahbuba Ahmed says
What are some methods to protect yourself online?
To protect myself online, there are basic yet effective measures I can apply. First, create strong and unique passwords for the accounts I have and update them regularly. Active two factor authentication whenever possible to add an extra layer of security. I’m always clicking on the links or downloading attachments, especially from unknown sources. Keeping my software antivirus and up to date, avoid sharing personal information on public forums and adjust privacy settings on social media. I try to monitor my account often for any suspicious activity and users reputable security tools. Lastly, there are a lot of online scams and phishing techniques to be cautious about to avoid the potential threats. I think these simple practices can significantly enhance my online safety.
Madison Masino says
Hi Mahbuba,
Strong and unique passwords are definitely a really good step in protecting yourself online. I always try to choose new ones that I haven’t used before with a combination of different numbers and symbols.
Hawa Barry says
Hi Mahbuba, these are great examples of online safety. It’s much easier nowadays to recognize online scams and phising techniques compared to the early 2000s, so that makes online safety that much easier; however for people who aren’t as attuned to those dangers, your other methods are highly helpful.
Samir Lagouit says
What is threat modeling?
Threat modeling is exactly what is sounds like. It’s preparing yourself for a specific situation/threatening situation and in doing that almost developing a model. There’s a series of questions to ask yourself when going about threat modeling. The generic who, what, why’s that you can dive into when you go deeper into this. However, there are other tools to take into account when threat modeling. There are some advanced machines or algorithms that can protect highly sensitive information, and that’s’ very good at doing so. However, it’s important to have the right funding, and personal doing such things. It’s also more important to not use such tools if there is not a necessity.
Threat modeling is useful to individuals protecting sensitive online information whether personal, or for work. The same use of threat modeling can be instilled for small business’s all the way up to corporations. While team size may vary, the goal and way to go about threat modeling will not.
Salvatore Marsico says
Hi Samir,
I liked reading your post about threat modeling because it gave me a better understanding and how it is preparing myself for a specific situation/threatening situation. By doing this, I am creating my own model, which I can dive into further.
Madison Masino says
What is threat modeling?
Threat modeling is one of the most important component of staying secure online. There are five questions you need to answer in order to figure out your threat model:
What do you want to protect?
Who do you want to protect it from?
How likely is it that you will need to protect it?
How bad are the consequences if you fail?
How much trouble are you willing to go through in order to try to prevent those consequences?
You must identify threats and then define countermeasures to prevent those threats. Assessing their severity and than prioritizing solutions to prevent the threats.
Salvatore Marsico says
Hi Madison,
I enjoyed reading your post about threat modeling. It enhanced my understanding of the topic and has provided me with questions to ask myself to figure out my own threat model.
Salvatore Marsico says
Ransomware is a type of malware that encrypts and locks the targeted victim. The criminals who act in this crime usually want some type of payment for the data that they stole or encrypted. One of the main reasons hospitals are targeted so often is because they deal with personal and private data, which gives criminals access to very valuable information. Another reason is that healthcare providers or hospitals often do not invest heavily in cyber protection and become an easy target for cybercriminals because they tend to not do a lot of work. COVID-19 allowed cyber criminals to take advantage of all of the chaos caused by the pandemic. One of the major actors in cyber is Russia who has attacked networks and systems before through Ukraine, which are connected to the rest of the world. Most small and medium sized hospitals are at risk of cyber attacks because they do not have the funds to invest in cyber protection, which makes them an easier target.
Lesly Puma Vinansaca says
Hi Salvatore
Very good explanation of ransomware. I enjoyed your example of how cyber criminals took full advantage of when the world was in panic during COVID-19. It can be scary so more hospitals should invest in better cyber protection.
Ereny Abousaif says
Hi Salvatore
Excellent description about ransomware. I liked how you illustrated how cybercriminals profited greatly from the COVID-19 fear that engulfed the world. Since it can be frightening, more hospitals ought to spend money on stronger cyber security.
Max Smith says
Who is Alan Turing, and what is the Turing test used for?
Alan Turing, commonly known as the “Father of AI” was a British crypt analyst during WWII. Famously he was instrumental in cracking the German Enigma code which eventually led to an allied victory. In addition, he lends his name to a modern-day test which is used to determine whether a computer (AI) is able to think and act like a human being.
Colin Johnson says
Max,
Your post provides a concise overview of Alan Turing’s significant contributions to both cryptography and the field of artificial intelligence. Turing’s pivotal role in breaking the German Enigma code during World War II highlights his remarkable intellect and problem-solving abilities.
Lesly Puma Vinansaca says
Organizations can identify and evaluate possible security threats and vulnerabilities related to their systems, applications, or processes by using a structured approach called threat modeling. In order to effectively mitigate or manage the risks, it entails analyzing the system architecture, identifying potential threats, assessing the likelihood and impact of those threats, and developing strategies. Iterative processes like threat modeling should be incorporated into continuous risk management procedures and the software development lifecycle. Organizations can enhance the security posture of their systems, lower the probability of security incidents, and lessen the possible impact of security breaches by proactively identifying and resolving security threats and vulnerabilities early in the development process.
M'Kyah Graham says
Ransomware is malware intended to restrict access to a victim’s data until a ransom is paid. For example, if I were to be a victim, I may not be able to access my personal files until I pay the required amount to whom the malware belongs. Ransomware is most effective where copious amounts of information is stored and used often. This makes hospitals ideal targets. Patients are assisted day in and out. Their information is constantly collected and/or updated, so that medical personnel can assist them with the highest level of effectiveness. Lab results, research information, and medical history are also important files they may lie within a hospital’s software. A criminal intending to use ransomware has a good chance of having their ransom paid, because blocking a hospital’s access to patient information, and other medical files would severely affect the way a hospital can run.
Hamida Akther says
Hi M’Kyah,
I like reading your post about Ransomware, and why are hospitals often targeted. I agree that since hospitals is the easiest way to find all the information about a person that is why it is target by hackers most of the time.
Ereny Abousaif says
Hi M’Kyah,
Your post about ransomware and why hospitals are frequently attacked is interesting to read. I believe that hospitals are frequently targeted by hackers since they offer the quickest and easiest means to obtain all of a person’s information.
Mairaliz Negron says
Hi M’Kyah,
I found your post to be super informative. I can see how hospitals are the perfect target for Ransomware.
Hamida Akther says
What is thread modeling?
Threat modeling is a method used to identify potential threats and vulnerabilities and prioritize them all from a hypothetical attacker viewpoint. It is the process of using hypothetical scenarios, system diagrams, and testing to help secure systems and data. The simplest way to figure out your threat model is by asking these five questions: what do you want to protect? Who do you want to protect it from? How likely is it that you will need to protect it? How bad are the consequences if you fail? How much trouble are you willing to go through in order to try to prevent those consequences? By answering these questions, you can figure out what tools to use to protect your information. Also, not to use any obscure custom operating systems that are not really necessary for you or you are not sure of how to use, that can put you in a bigger risk because you might be using a false sense of security that can be a threat to your personal or work information. Use threat modeling to protect from potential threat to information.
Max Smith says
Hi Hamida,
I thought your explanation of threat modeling was excellent. Including the questions that should guide the implementation of your threat model is very informative. In addition, I learned that sticking with supported and standard operating systems can help keep your business data (personal information) safe.
Ereny Abousaif says
What is threat modeling?
A methodical and structured strategy called threat modeling is used to find, evaluate, and reduce possible security risks in a system, application, or procedure. Threat modeling helps firms to put in place efficient security measures by anticipating and identifying vulnerabilities and shortcomings.
Threat modeling entails a number of crucial steps. The scope of the system is first established, including its borders, elements, data flows, and external interactions. Next, the system’s resources and assets that need to be protected—like sensitive data or essential features—are listed and given a priority.
Potential risks and weaknesses are then discussed and determined, covering a range of attack methods such denial-of-service attacks, illegal access, and data breaches. After that, a complete risk assessment is carried out, assessing each detected threat’s likelihood and its impact. Next, risks are ranked according to how serious they are.
The hazards that have been identified are addressed via mitigation techniques. In order to lessen the possibility or effect of possible risks, this may entail putting security measures in place, redesigning components, or following best practices. Documentation is essential to this process because it records all aspects of the threat modeling process, such as threats that have been detected, risks that have been evaluated, and suggested mitigation techniques. Stakeholders can refer to this documentation, which is subject to updating as the system develops.
A crucial component of the security development lifecycle, threat modeling finds use in network architecture, software development, and critical infrastructure planning. Organizations can improve system security and asset protection by identifying and resolving possible security issues early in the development or deployment phase.
Colin Johnson says
What is threat modeling?
Threat modeling is a proactive approach to cybersecurity that involves identifying, evaluating, and mitigating potential threats to an organization’s assets. At its core, threat modeling involves systematically analyzing a system or application to understand its vulnerabilities and the potential ways attackers could exploit them. This process typically involves identifying assets, such as sensitive data or critical infrastructure, understanding potential threats and attack vectors, assessing the likelihood and impact of those threats, and finally, devising strategies to mitigate or eliminate them.
Erica Griggs says
Hello Corey!
Thank you for the breakdown of threat modeling. It was very easy to follow and informative.
Jorgelina Rodriguez says
great breakdown on threat modeling! nice
Corey Reagan says
What are some methods to protect yourself online?
In today’s world, it is more important than ever to take precautions to protect yourself online. With the growing problem of cyber threats and online scams, it is crucial to be vigilant and proactive in protecting your personal information and data. One of the most fundamental ways to protect yourself online is to establish strong and unique passwords for all of your accounts. Using weak or easily guessable passwords can make it incredibly easy for hackers to gain access to your sensitive information. Secondly, be careful of the information that you put on social media and avoid sharing personal details such as your address, phone number, or financial information. To protect your computer, it is crucial to keep your devices and software up to date in order to protect yourself online. Hackers often target vulnerabilities in outdated software to gain access to different devices that you’re connected to. Also you always want to use caution when clicking on links or downloading files. Phishing emails and hacker websites are common tactics used by cybercriminals to trick users into revealing sensitive information or downloading malware onto their devices. You always want to use caution with anything you do online and be careful with everything you do and say.
Erica Griggs says
Thank you for the tips Corey! This post on online identity protection was very informative!
Hadeer Saad says
Great post, its important to consider these methods when online. There are so many ways to protect yourself, yet it’s so easy to make some mistakes if you don’t consider these angles.
Erica Griggs says
“Understanding AI: Three Types Explained”
In our MIS class, let’s simplify Artificial Intelligence (AI) types. First, there’s “Narrow AI” that does one thing well, like facial recognition on your phone! Then, “General AI” is like a versatile genius, doing various tasks like humans – but it’s not real yet, more like a future goal. Lastly, “Superintelligent AI” is a hypothetical super-smart level, still in sci-fi.
For examples, Siri and Alexa are Narrow AI, specialized in voice commands. General AI is more conceptual at this point! Imagine a robot handling diverse tasks. Superintelligent AI, as seen in movies, depicts highly advanced machines dominating. So, in a nutshell, AI starts small, aims to be wel rounded, and dreams of reaching super smart heights. That’s the trio: Narrow, General, and the futuristic Superintelligent AI.
Mairaliz Negron says
What are some methods to protect yourself online?
Two methods to protect yourself online are to use strong passwords and limiting what you share
– To create strong passwords incorporate numbers, letters, and symbols to strengthen your password. Try to make them as long as possible as well and try to avoid being repetitive in using the same password for every platform you use. Switch them up a bit to decrease your chances of having something of yours compromised.
– Be careful of the personal things you share online. Try to avoid sharing personal information online. Determine what is necessary for you to share and what is unnecessary
Leanna Paul says
Hi Mairaliz, you stated two great methods on protecting yourself online. In middle school, they sent people to the school to talk to every class and made us create a hard password with characters, numbers, capitals, etc. Great post!
Leanna Paul says
The Turing test was developed by British mathematician and computer scientist Alan Turing, who had studied the concept of machine learning for several years beforehand. The Turing test is one of the most well-known methods of evaluating how well artificial intelligence can think like a human. Basically, if a machine can engage in a conversation with a human without being detected as a machine, it has demonstrated human intelligence.
Jorgelina Rodriguez says
To protect the security and privacy of sensitive and personal data, a number of legislation cover cybersecurity and data protection. One example is the European Union’s General Data Protection Regulation (GDPR), which sets tight guidelines for data handling, processing, and user permission. The Health Insurance Portability and Accountability Act (HIPAA) governs health information protection in the US. Residents of California have privacy rights with regard to their personal data thanks to the California Consumer Privacy Act (CCPA). Furthermore, recommendations for managing and mitigating cyber risks are provided by cybersecurity regulations like the NIST Cybersecurity Framework. Companies must abide by these rules in order to stay out of legal trouble and keep customers’ confidence about the security and privacy of their data.
Hadeer Saad says
Hi Jorgelina,
Great post; you highlighted the EU’s data protection regulations in your example. Keeping data secure is becoming increasingly important, and I’m glad there are some standards in place for this currently.
Lancelot Nyandoro says
the beauty of cyber connection is also its downfall. Because of this thing like GDPR, and HIPAA have to be put into place but as much as we add laws these always going to be way to break them.
Dylan Milano says
Hi Jorgelina,
Your discussion on legislation covering cybersecurity and data protection is informative, highlighting key regulations such as GDPR, HIPAA, CCPA, and the NIST Cybersecurity Framework. By emphasizing the significance of these regulations in safeguarding sensitive data and maintaining consumer trust, you underscore the importance of compliance with data protection laws.
Daniel Taylor says
Hey Jorgelina this was a very interesting post and I enjoyed knowing more information about the European laws tight laws on data privacy which prevent attackers to collect people’s private data.
Dylan Milano says
Threat modeling is a structured approach to identifying potential security threats and vulnerabilities in systems or applications. By proactively analyzing different attack vectors, potential risks, and security controls, organizations can develop a comprehensive security strategy to mitigate threats effectively. Threat modeling enables security professionals to prioritize risks, allocate resources efficiently, and enhance the overall security posture of an organization. By adopting threat modeling practices, businesses can identify and address security weaknesses before they are exploited by malicious actors, ultimately strengthening cybersecurity defenses and safeguarding sensitive information.
Data protection and cybersecurity regulations play a critical role in safeguarding personal information, preventing data breaches, and ensuring compliance with legal requirements. Regulations such as the General Data Protection Regulation in the European Union and the Health Insurance Portability and Accountability Act in the United States outline rules and guidelines for data protection, privacy, and security practices. Compliance with these regulations is essential for organizations to protect customer data, maintain trust, and avoid costly penalties resulting from data breaches or non-compliance. By adhering to data protection regulations and cybersecurity best practices, businesses can uphold data privacy standards, mitigate risks, and demonstrate a commitment to safeguarding sensitive information.
Hadeer Saad says
What is threat modeling?
Threat modeling is a systematic approach used to identify, assess, and mitigate potential cybersecurity threats and vulnerabilities within a system, application, or organization. It involves analyzing the various assets, components, processes, and interactions within the system to identify potential threats, vulnerabilities, and attack vectors that could compromise security.
The threat modeling process typically consists of several key steps:
1. Asset Identification: Identifying and prioritizing the assets, such as data, infrastructure, applications, and intellectual property, that need to be protected.
2. Threat Identification: Identifying potential threats and adversaries that could exploit vulnerabilities to compromise the security of the system or organization.
3. Vulnerability Assessment: Identifying weaknesses, flaws, or misconfigurations within the system that could be exploited by attackers to achieve their objectives.
4. Risk Assessment: Assessing the likelihood and potential impact of identified threats and vulnerabilities on the organization’s security posture and business objectives.
5. Mitigation Strategies: Developing and implementing mitigation strategies and controls to reduce the likelihood and impact of identified threats and vulnerabilities, such as implementing security controls, applying patches, or redesigning system architecture.
Threat modeling helps organizations proactively identify and address security risks, prioritize security investments, and improve overall security posture by integrating security considerations into the design, development, and operation of systems and applications. It is an essential component of a comprehensive cybersecurity program aimed at protecting critical assets and mitigating cybersecurity threats.
Lancelot Nyandoro says
Alan Turing was a British mathematician, logician, cryptanalyst, and computer scientist who lived from 1912 to 1954. He is widely considered one of the most influential figures in developing theoretical computer science and artificial intelligence. Alan Turing was a codebreaker during World War two. he was one of the codebreakers who worked on breaking the German Enigma code/machine. unfortunately due to his homosexuality, his work and contribution have gonna hugely unnoticed. The Turing test is used to test companies and software on if they can be intelligent or self learn things
Kerri McGuckin says
Hi Lancelot,
I really enjoyed learning about Alan Turing and agree that it is unfortunate he does not get the recognition he deserves. I remember the professor mentioning there was a documentary about him, I will likely watch this in the near future. The Turing test seems incredibly groundbreaking for that time period.
Kerri McGuckin says
There are three types of artificial intelligence.
1. Narrow AI – This refers to AI systems that are designed to perform a specific task. Siri and Alexa would fall under this category as they are virtual personal assistants and have a limited scope. Systems that can recommend products to you would fall under Narrow AI as well. This would include platforms like Netflix and Amazon as they use your previous search history to show you items and movies you may be interested in. (Narrow AI is the level of AI we are currently at).
2. General AI – This refers to AI systems that have the ability to learn and apply knowledge to a wide range of tasks. An example of this would be many robots in sci-fi movies.
3. Superintelligence AI – This example refers to AI systems that completely pass human knowledge in every aspect. Examples would also include robots from sci-fi movies.
Alan Turing was a scientist that is considered to be the founding father of computer science and artificial intelligence. He is known for his concept the Turing machine, which paved the way to computation.
The Turing Test is a measurement of a machine’s ability to show behavior that is human like. The test has humans engaging in conversations with computers, if they cannot tell they’re talking to a computer than the computer has passed the Turing Test.
Hawa Barry says
Three types of artificial intelligence include narrow, general, and superintellignece. Narrow, or ANI, are designed to carry out specific tasks and solve problems without being designed for that sole purpose. They are typically used in voice assistants, image recognition systems, customer service requests, and tools that flag inappropriate content. Next there is general, or AGI, which hypothetically would match human intelligence; this type of AI is still conceptual, but it’s a possibility down the line as technology further advances. Finally, superintelligence, or ASI, is the doomsday level of AI, something that would surpass human intellect and outperform humans. I am not ignorant to AI but I am not a fan of it’s use in the arts. It’s very empty and lazy to me, and I don’t enjoy the struggle AI brings to creatives.
Daniel Taylor says
What is Ransomware, and why are hospitals often targeted?
So this is a new term I learned in this class and was happy to research this word to gain more insight and Ransomware is a type of malware that locks and encrypts a victim’s data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment. After reading the definition of it and looking at the word it makes much more sense now that it had to be a ransom type of event. However, the real question was why are hospitals the biggest target for it and I discovered that private patient information is worth a lot of money to attackers. Hospitals store an incredible amount of patient data. Confidential data that’s worth a lot of money to hackers who can sell it quickly.