{"id":3688,"date":"2023-03-01T14:09:25","date_gmt":"2023-03-01T19:09:25","guid":{"rendered":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/?p=3688"},"modified":"2023-03-01T14:09:25","modified_gmt":"2023-03-01T19:09:25","slug":"threat-modeling-and-cybersecurity-4b","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/2023\/03\/01\/threat-modeling-and-cybersecurity-4b\/","title":{"rendered":"Threat modeling and Cybersecurity. 4B"},"content":{"rendered":"<p>Threat modeling is the process of defining and analyzing assets, identifying potential threats and assessing the likelihood that these threats could exploit those assets. It requires a comprehensive understanding of the system, its components, architecture, available security controls, and other security considerations. The goal of threat modeling is to identify and prioritize areas of risk that need to be addressed by security controls.<\/p>\n<p>Regulations involved with data protection and cybersecurity:<\/p>\n<ol>\n<li>The General Data Protection Regulation (GDPR)<\/li>\n<li>The Data Protection Act<\/li>\n<li>The California Consumer Privacy Act (CCPA)<\/li>\n<li>Health Insurance Portability and Accountability Act (HIPAA)<\/li>\n<li>Payment Card Industry Data Security Standard (PCI DSS)<\/li>\n<\/ol>\n<p>Ransomware is a type of computer malware that restricts access to the victim&#8217;s data by encrypting it and demands a ransom payment in order to decrypt and regain access. Hospitals are often targeted because medical records and other personal data are highly valuable on the black market. Hospitals also have a greater incentive to pay the extortion fee since the alternative could potentially be a disruption of critical medical services.<\/p>\n<ol>\n<li>Use strong passwords and two-factor authentication: Choose passwords that are at least 8 characters long and include a combination of numbers, symbols, and upper- and lower-case letters. Consider using two-factor authentication to add an extra layer of security to your accounts.<\/li>\n<li>Keep your operating system and security software up to date: Regularly update your operating system and security software to protect against the latest threats.<\/li>\n<\/ol>\n<p>Alan Turing was a British mathematician, computer scientist, and theoretical biologist. He is credited as being the father of modern computer science and artificial intelligence. The Turing Test is a test used to determine whether or not a computer is able to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human. It was developed by Turing in 1950, and it works by having a human judge interact with two parties at the same time \u2013 one being a human and the other being a computer. The judge must determine which is which based solely on their conversation with the two.<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-3689\" src=\"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/files\/2023\/03\/th-2-300x168.jpeg\" alt=\"\" width=\"300\" height=\"168\" srcset=\"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/files\/2023\/03\/th-2-300x168.jpeg 300w, https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/files\/2023\/03\/th-2.jpeg 474w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat modeling is the process of defining and analyzing assets, identifying potential threats and assessing the likelihood that these threats could exploit those assets. It requires a comprehensive understanding of the system, its components, architecture, available security controls, and other security considerations. The goal of threat modeling is to identify and prioritize areas of risk [&hellip;]<\/p>\n","protected":false},"author":29452,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[10531],"tags":[845114,555709,685722,178,479,845088],"class_list":{"0":"post-3688","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-student-post","7":"tag-alan-turing","8":"tag-cybersecurity","9":"tag-digital-identity","10":"tag-mis","11":"tag-social-media","12":"tag-threat-modeling","13":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts\/3688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/users\/29452"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/comments?post=3688"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts\/3688\/revisions"}],"predecessor-version":[{"id":3690,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts\/3688\/revisions\/3690"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/media?parent=3688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/categories?post=3688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/tags?post=3688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}