• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

In The News

October 21, 2021 by David Lanter 4 Comments

Filed Under: Unit 10: Network Security Tagged With:

Reader Interactions

Comments

  1. Shubham Patil says

    October 24, 2021 at 9:26 pm

    Four network security tips for businesses in a hybrid work world

    While it’s mostly big businesses and high-profile hacks that make headlines, small to medium-sized businesses (SMBs) are also targets for bad actors — costing them downtime, data, business and revenue. The best network defense is a strong, proactive security offense. Here are four tips for businesses of all sizes looking to shore up their cybersecurity protocols and products.

    1. Implement a mix of threat monitoring, firewalls and anti-virus solutions
    2. Manage devices and passwords for an extra layer of security
    3. Enact strong policies and practices.
    4. Educate your users on security tools and best practices

    Link: https://www.bizjournals.com/twincities/inno/stories/partner-content/2021/10/05/4-network-security-tips-for-biz-in-a-hybrid-work.html

    Log in to Reply
  2. Yangyuan Lin says

    October 26, 2021 at 1:51 pm

    This article “Denial-of-Wallet attacks: How to protect against costly exploits targeting serverless setups” is about a new network attack risk: Denial-of-Wallet attacks (DOW) which are specifically aimed at serverless users. In recent years, as organizations continue to realize the benefits of this easily scalable, cloud-based infrastructure model, the popularity of serverless computing has exploded. Cyber attacks DOW specifically targeting cloud-based infrastructure have also grown. DoW attacks are similar to DoS attacks, but DoW will cause economic losses to the victims. Serverless providers charge users based on the number of resources consumed by the application. If an attacker floods the website with traffic, the website owner may face huge bills.

    Link: https://portswigger.net/daily-swig/denial-of-wallet-attacks-how-to-protect-against-costly-exploits-targeting-serverless-setups

    Log in to Reply
  3. Elizabeth Gutierrez says

    October 26, 2021 at 9:10 pm

    The article I selected this week “DDoSers take weekend off only to resume campaign against UK’s Voipfone on Monday” is from The Register. Voipfone is an internet telephone service provider who experienced a DDoS attack last week; the company placed the blame on the Russian cybercriminal gang REvil. On Friday, October 22nd, the company’s platform was impacted for approximately four hours as a result of the attack. While the company believed that they were in the clear and had overcome this obstacle, they could not be more wrong. A follow-up attack by the same group of cybercriminals“took the weekend off” and attacked Voipfone again on October 25th; it was suggested that this second outage may have lasted more than 24 hours. The outage and destruction to voice calling services was frustrating to customers who use the platform for business. In the article it describes that back in September, Voipfone and VoIP Unlimited (I assume are from the same company) services were “intermittently disrupted” by devices flooding its network with misleading traffic. The chair of Comms Council UK, infers that these attacks are a “coordinated extortion-focused international campaign by professional cybercriminals”. By attacking telecommunication services, these cybercriminals are affecting critical infrastructure organizations and operations; that may be their goal.

    Link to article: https://www.theregister.com/2021/10/26/voipfone_outage/

    Log in to Reply
  4. Oluwaseun Soyomokun says

    October 26, 2021 at 9:19 pm

    Australian QuintessenceLabs grabs $25M to scale quantum-safe cybersecurity solutions

    Main Sequence and TELUS Ventures with participation from Mizuho Financial Group-backed InterValley Ventures and Capital Property Group threw money at the problem of cybersecurity may seem like a good idea in tackling a few of the problem in the short term—particularly when an intrusion occurs—but an ad hoc approach to funding likely will not be effective in the long term. Business and cybersecurity leaders instead must come to a shared understanding of costs and impact and develop a clear strategy for funding cybersecurity programs timely and not limited to the big players mentioned above.

    As computing power increases exponentially, the ability to secure our data against brute force and other types of attacks gets more complicated, with the scale and sophistication of cyberattacks continuing to challenge companies’ ability to implement effective data access control and encryption.

    To increase data security, Canberra, Australia-based quantum cybersecurity solution provider QuintessenceLabs safeguards sensitive data through its quantum random number generators and advanced data access control software. The startup has now raised $25 million in a Series B round to enhance its security in quantum solutions.

    The latest funding was led by Main Sequence and TELUS Ventures, with participation from Mizuho Financial Group-backed InterValley Ventures and Capital Property Group.

    QuintessenceLabs will use the Series B funding to expand its customer base, including private and public organizations in financial services, cloud providers, government agencies and defense sectors globally, CEO and founder of QuintessenceLabs Vikram Sharma told TechCrunch.

    or a $2 billion program run by the U.S. Department of Homeland Security, focused on strengthening data protection across participating agencies, Sharma told TechCrunch.

    The Australia-headquartered company opened an office in the U.S. in 2013 with an initial team of three people to make a more significant commitment to the U.S.

    As the U.S. is by far the largest cybersecurity market, QuintessenceLabs will continue to grow its team in the U.S. over the next two to three years, Sharma said.

    “As computing power increases exponentially, the tools needed to secure critical data and assets must stay several steps ahead,” said Bill Bartee, partner of Main Sequence. “QuintessenceLabs is a global leader in developing quantum-based cybersecurity tools that help protect sovereign and commercially sensitive business and provide customers with a critical layer of protection.”

    link: https://finance.yahoo.com/news/australian-quintessencelabs-grabs-25m-scale-130041918.html

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in