• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

In The News

October 14, 2021 by David Lanter 4 Comments

Filed Under: Unit 09: Business Continuity and Disaster Recovery Tagged With:

Reader Interactions

Comments

  1. Oluwaseun Soyomokun says

    October 16, 2021 at 2:26 am

    I found this article about Vice President Cybersecurity Advisor Network – Peter Coroneos explains the “Zero day vulnerabilities are flaws in software or systems code that leaves end users open to attack.
    “They are called ‘zero day’ because they are either unknown to the vendor who produced the product, or are known but no patch has yet been made available.

    “The period between when the zero day is first discovered by an attacker and when the patch is installed by the end user is the attack window in which a compromise can occur. The consequences can be vast and most serious attacks these days involve zero day exploits.”
    “The first famous zero day attack was Stuxnet in 2009 against the Iranian uranium enrichment program. More recent attacks include WannaCry, NotPeyta, SolarWinds, MS Exchange Server hacks of 2021 and the infamous Colonial Pipeline ransomware attack.”
    “‘White hat’ zero day researchers form a critical piece in the remediation of exploitable connected systems. They uncover the existence of unpatched vulnerabilities and report them to vendors of the relevant products they can be fixed. Regrettably, they face legal threats from some vendors sensitive to the discovery of flaws in their products.
    Most digital security incidents are caused by malicious actors (e.g. cybercriminals and state-sponsored groups) exploiting vulnerabilities in organisations’ digital ecosystems. Addressing vulnerabilities before attackers take advantage of them is an effective means of reducing the probability of cybersecurity incidents. This article discusses vulnerabilities in products’ code such as software and firmware, and in how products are implemented in information systems. It shows that the technical community has progressed in developing good practice for treating vulnerabilities, including through co-ordinated vulnerability disclosure (CVD). However, significant economic and social challenges prevent stakeholders from adopting good practice, such as legal frameworks that do not sufficiently protect “ethical hackers” from legal proceedings. The paper stresses that public policies aimed at removing obstacles and encouraging vulnerability treatment could significantly reduce digital security risk for all.

    https://itwire.com/security/video-interview-cyan-vp-peter-coroneos-explains-why-laws-are-needed-to-protect-ethical-zero-day-cyber-research.html

    Log in to Reply
  2. Shubham Patil says

    October 16, 2021 at 4:48 pm

    I found this article which relates to our current topic: Business continuity and disaster recovery – How Disaster Recovery Is No Longer Optional For Today’s Businesses. Recent disasters like Hurricane Ida, Superstorm Sandy and the February 2021 winter storm in Texas have certainly increased the risks to businesses and IT infrastructures.

    Nearly two-thirds of SMBs impacted by a fire, flood, hurricane, tornado or earthquake no longer exist 12 months later. This highlights the need for SMBs to develop a business continuity plan, and that plan should include a strategy for recovering IT assets.

    The article focuses on three aspects:

    Disaster Recovery As Business Insurance
    The Cloud Changed The DR Game
    Risk Management In Changing Times

    Link: https://www.forbes.com/sites/forbestechcouncil/2021/10/12/why-disaster-recovery-is-no-longer-optional-for-todays-businesses/

    Log in to Reply
  3. Elizabeth Gutierrez says

    October 18, 2021 at 8:17 pm

    The article I found this week on The Register concerns Zoom’s $15 billion merger with Five9, a California call-center-in-the-cloud probed by the United States for national security risks. Zoom’s ties to China happen to be the center of a US government investigation and appear to be a call for concern since the association could pose a risk to the national security of law enforcement interests of the United States. The U.S. The Department of Justice has also voiced its concerns and “believes that … risk may be raised by the foreign participation (including the foreign relationships and ownership) associated with the application.” As a result, they are mandating a review by the Committee for the Assessment of Foreign Participation in the United States Telecommunications Service Sector committee “to assess and make an appropriate recommendation as to how the [FCC] should adjudicate this application.” The article mentions that in the past Zoom was spotted routing connections through China and the U.S. urged the platform to better their security measures but they fell-short of those promises. A spokesperson for Zoom expressed their confidence in completing its merger with Five9, and ensured that the Five9 acquisition is “subject to certain telecom regulatory approvals”; they are also supposed to be overseen by regulatory agencies.

    Link to article: https://www.theregister.com/2021/09/22/zooms_15bn_merger_with_five9/

    Log in to Reply
  4. Yangyuan Lin says

    October 20, 2021 at 1:55 pm

    The name of the article “Cybercrime Costs Organizations Nearly $1.79 Million Per Minute” describes the economic losses caused by hacking activities. According to a survey of the amount of malicious activity on the Internet, the scale and damage of cyber attacks in the past year showed that 648 cyber threats occurred per minute. The average cost of a violation was US$7.2 per minute, while the overall predicted cyber security expenditure was per minute. US$280,060. During the COVID-19 pandemic, cybercriminals took advantage of the shift to online shopping during the COVID-19 pandemic, resulting in online payment fraud of $38,052 per minute. Also, healthcare is another industry that has faced a surge in cyber attacks since the beginning of COVID-19, losing $13 per minute due to digital security breaches in the past year. The report also examines the impact of different forms of cybercrime. It shows that $3615 per minute is lost by cryptocurrency fraud, 525,600 records are leaked, and 6 organizations become victims of ransomware. People’s lives are getting better because of the development of science and technology, but also because of the development of science and technology. The problem of network security is getting worse because of the development of science and technology. People’s information security and property security have also become problems.

    https://www.infosecurity-magazine.com/news/cybercrime-costs-orgs-per-minute/

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in