• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

In The News

October 6, 2021 by David Lanter 3 Comments

Filed Under: Unit 08: Case Study 3 - A Hospital Catches the "Millennium Bug" Tagged With:

Reader Interactions

Comments

  1. Elizabeth Gutierrez says

    October 12, 2021 at 6:53 pm

    I found the article, “Combatting security threats to our nation’s critical water infrastructure”, on securitymagazine. It addresses how utilities are transforming by incorporating information technology (IT) and operational technology (OT) into their management and operations to assist with meter reading, leak detection, and other operational goals. Additionally, control systems manage chemical feeds, pumps and other aspects of water treatment and movement. Unfortunately, the adoption of new technologies gives a passage for new attacks which have the potential to interrupt and cause inconvenience to water supply and wastewater treatment, impact public health and the environment, undermine the economy, and put our national security at risk. In fact, Dragos, a cybersecurity firm, reports hundreds of ICS incidents over the last decade across multiple sectors. According to a June survey report by the Water Sector Coordinating Council, 40% of utility managers do not address cybersecurity in their risk management plans. The article asserts that recent ICS attacks could have likely been prevented by “limiting access to sensitive systems, not sharing passwords, and removing access for former employees.” Furthermore, it suggests investing in cybersecurity and building a culture of cybersecurity awareness by updating equipment, modern business applications, hiring of cybersecurity professionals, and regular staff training on best practices, and participating in information-sharing networks. The article brought to my attention a four-step methodology for “preventing sabotage” known as the Consequence-driven Cyber-informed Engineering (CCE).

    How the CCE works:
    – “CCE begins with the assumption that if a critical infrastructure — a water system or power plant, for instance — is being targeted by highly skilled adversaries, then the target will be sabotaged.
    1. Created by Idaho National Laboratory (INL), the methodology first examines where failures could occur and then looks at adversaries’ capabilities. …
    2. This is followed by a discussion of how an attack might take place.
    3. The final phase has the target evaluating changes to mitigate at the time of the attack”

    Link to article: https://www.securitymagazine.com/articles/96263-combatting-security-threats-to-our-nations-critical-water-infrastructure

    Log in to Reply
  2. Shubham Patil says

    October 13, 2021 at 11:34 pm

    NIST CSF in the AWS Cloud

    NIST CSF represents a set of cybersecurity practices, outcomes, and
    technical, operational, and managerial security controls (referred to as Informative
    References) that support the five risk management functions – Identify, Protect, Detect,
    Respond, and Recover

    Governments, industry sectors, and organizations around the world are increasingly
    recognizing the NIST Cybersecurity Framework (CSF) as a recommended cybersecurity
    baseline to help improve the cybersecurity risk management and resilience of their
    systems. This paper evaluates the NIST CSF and the many AWS Cloud offerings public
    and commercial sector customers can use to align to the NIST CSF to improve your
    cybersecurity posture. It also provides a third-party validated attestation confirming AWS
    services’ alignment with the NIST CSF risk management practices, allowing you to
    properly protect your data across AWS.

    Link:
    https://d1.awsstatic.com/whitepapers/compliance/NIST_Cybersecurity_Framework_CSF.pdf

    Log in to Reply
  3. Yangyuan Lin says

    October 20, 2021 at 2:23 pm

    “This new ransomware encrypts your data and makes some nasty threats, too”

    Cybercriminals are distributing a new form of ransomware which is called Yanluowang to attack victims. They will not only encrypt the network, but also threaten to launch a distributed denial-of-service (DDoS) attack without paying the ransom. Harass employees and business partners. Yanluowang sent a ransom letter to the victim, telling the victim that they had been infected with ransomware, and told them to send a contact address to negotiate payment of the ransom. They will call employees and business partners. They also suggest that if the victim does not cooperate, they will return an additional attack or even delete the encrypted data, so it is lost forever.

    https://www.zdnet.com/article/this-new-ransomware-encrypts-your-data-and-makes-some-nasty-threats-too/

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in