• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

In The News

September 23, 2021 by David Lanter 3 Comments

Filed Under: Unit 05: Creating a Security Aware Organization Tagged With:

Reader Interactions

Comments

  1. Yangyuan Lin says

    September 28, 2021 at 1:51 pm

    This article is about social media scam, which is called Twitter bots are tricking users into making PayPal and Venmo payments into fraudsters’ accounts.

    Bots will search for “PayPal”, “Venmo” and other keywords to find tweets, and obtain the personal information of legitimate users to pretend to be legitimate users. Then Bots would block the account it imitated, and in their case copied the entire configuration file and added an underscore to the end of the name. (For example, the legal user’s name is “Lin”, but the name impersonated by Bots will be “Lin_”)
    The bot will use similar usernames to pretend to be other users and provide false payment information to the original Twitter user to obtain payment. Bots usually don’t delete posts, but often change names. These fake accounts are hard to find, and they even have fans.

    (Personal experience: I was scammed once on Facebook, it was not a bot but a person. He changed the lowercase L(l) to the uppercase i(I) to imitate legitimate users.)

    Log in to Reply
  2. Shubham Patil says

    September 28, 2021 at 4:16 pm

    The National Institute of Standards and Technology plans to publish various volumes of its forthcoming Cybersecurity Practice Guide throughout 2022 and beyond.

    Zero Trust Network Architecture:

    Zero Trust is a security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

    Link: https://www.fedscoop.com/nist-cybersecurity-practice-guide-2022/

    Log in to Reply
  3. Elizabeth Gutierrez says

    September 28, 2021 at 7:25 pm

    I obtained the article, “Awareness of cyberattacks and cybersecurity may be lacking among workers” by TechRepublic. A survey administered by Armis to business professionals discovered the lack of knowledge about recent incidents and proper cyber hygiene. The respondents were from a variety of different professional backgrounds such as education, finance, healthcare, IT & telecom, manufacturing, sales, media and marketing. Twenty-one percent of the respondents had not heard about the attack against Colonial Pipeline and forty-five percent of the respondents were unaware of the hack against the Florida water treatment plant; some of those that were familiar with the attacks did not see a lasting impact. Now that businesses are starting to open up again, many employees are moving to a hybrid model of working both at home and in the office. Despite the possible risks, more than half of the respondents said they do not believe their personal devices pose any threat to their organization, whereas twenty-seven percent admitted that their companies don’t have any existing policies to secure both work and personal devices. The article pointed out that “a lack of awareness turns an employee into an easy target for a cybercriminal looking to access an organization’s network via a phishing attack or social engineering”. Therefore, organizations can reduce the possibilities or success of an attack by normalizing a security awareness culture. At every level, employees should be taught how to identify malware-laced emails and other invasive attempts at credential theft so that they do not become easy targets for cybercriminals.

    Link to article: https://www.techrepublic.com/article/awareness-of-cyberattacks-and-cybersecurity-may-be-lacking-among-workers/

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in