{"id":3333,"date":"2023-02-27T17:10:06","date_gmt":"2023-02-27T22:10:06","guid":{"rendered":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/?p=3333"},"modified":"2023-02-27T17:11:41","modified_gmt":"2023-02-27T22:11:41","slug":"protecting-ourselves-from-hackers-4b","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/2023\/02\/27\/protecting-ourselves-from-hackers-4b\/","title":{"rendered":"Protecting Ourselves from Hackers (4b)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3338 alignright\" src=\"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/files\/2023\/02\/Best-Practices-for-Threat-Modeling-300x195.png\" alt=\"\" width=\"483\" height=\"314\" srcset=\"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/files\/2023\/02\/Best-Practices-for-Threat-Modeling-300x195.png 300w, https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/files\/2023\/02\/Best-Practices-for-Threat-Modeling-1024x666.png 1024w, https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/files\/2023\/02\/Best-Practices-for-Threat-Modeling-768x500.png 768w, https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/files\/2023\/02\/Best-Practices-for-Threat-Modeling.png 1107w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/>Threat modeling is when the user thinks about who would potentially try to breach data to better protect it. It reminds me of how detectives will try to solve a case by putting themselves in the suspects\u2019 shoes\u2014they try to think like the suspect in order to predict what moves the suspect would make. As technology becomes more and more of an essential part of daily life, data breaches and cyberattacks are quickly jumping the list of the most likely global risk, trumped only by natural disasters and extreme weather events.<\/p>\n<p>Ransome ware is malware that locks a computer to prevent the user from accessing data until a ransom is paid, typically in Bitcoin to prevent tracing. It is extremely effective since the hacker can tailor the hack to make it personalized and harder to crack, almost like creating a custom key to unlock the malware. It is often installed on a computer through tainted website links or clickable downloads. Hospitals are extremely susceptible to ransom ware due to the immediate need for up-to-date and accessible data. They cannot afford to shut down while they try to remove the ransom ware and will often give in to what the hacker wants in order to be able to access data again.<\/p>\n<p>It\u2019s important to back up your data often to prevent it from being lost, whether to a hacker or other. Also, you should never click suspicious links, and definitely do not download software that you don\u2019t fully trust.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat modeling is when the user thinks about who would potentially try to breach data to better protect it. It reminds me of how detectives will try to solve a case by putting themselves in the suspects\u2019 shoes\u2014they try to think like the suspect in order to predict what moves the suspect would make. As [&hellip;]<\/p>\n","protected":false},"author":29444,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[663943],"tags":[],"class_list":{"0":"post-3333","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-instructor","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts\/3333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/users\/29444"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/comments?post=3333"}],"version-history":[{"count":2,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts\/3333\/revisions"}],"predecessor-version":[{"id":3340,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts\/3333\/revisions\/3340"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/media?parent=3333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/categories?post=3333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/tags?post=3333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}