• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

In The News

October 28, 2021 by David Lanter 4 Comments

Filed Under: Unit 11: Cryptography, Public Key Encryption and Digital Signature Tagged With:

Reader Interactions

Comments

  1. Oluwaseun Soyomokun says

    October 31, 2021 at 11:32 pm

    Cyberattacks:
    Cyber threats vary widely across the globe with some countries at very high risk for attacks. The US is at a low risk for cyber threats. Research released this week from cybersecurity firm SEON shows Denmark with the lowest risk and the U.S ranked No. 3 for the lowest threat of a cyber attack.
    This infographic from Seon shows the most common types of cybercrime. (SEON)
    The Top 3 countries at low risk of cyber attacks:
    -Denmark – Cyber-Safety Score: 8.91
    Denmark is the most digitally secure country, according to SEON. Denmark scored high in cybersecurity indices and did well on the Cybersecurity Exposure Index.

    -Germany – Cyber-Safety Score: 8.76

    “This tells us that Germany is generally a very safe place for people to use the internet. We can attribute this rank to a very good result in the Global Cybersecurity Index combined with comprehensive laws and regulations,” SEON said.

    https://www.foxbusiness.com/technology/countries-most-risk-cyberattacks

    Log in to Reply
  2. Elizabeth Gutierrez says

    November 2, 2021 at 11:12 pm

    The following article, “‘Trojan Source’ Bug Threatens the Security of All Code”, was obtained from Krebson Security. Academics, namely, researchers from the University of Cambridge discovered that Unicode’s UTF-8 text encoding that handles different languages and allows computers to exchange information could be misused. More specifically, the weakness involves bidirectional (bidi) characters in Unicode that handles displaying text written in right-to-left languages such as Arabic and Hebrew that can switch the display ordering of groups of characters and disguise file extensions of malware or as mentioned previously, misrepresent source code that can lead to a supply-chain attack. The “logic” of the text can easily go undetected because it is challenging for a human code reviewer to detect an invalid source code, especially if it is subtle, and because there are no defenses for it. Furthermore, the bug has the potential to affect most computer code compilers and software development environments and be exploited to write malicious code that says one thing to humans and another to compilers. Considering people already know about the vulnerability, there is a possibility that they might start exploiting it, so the article and academics urge that organizations coordinate and act fast at least by releasing updates to address the security weakness or rewriting software build pipelines to halt if they encounter a bidi character.

    Link to article: https://krebsonsecurity.com/2021/11/trojan-source-bug-threatens-the-security-of-all-code/

    Log in to Reply
  3. Yangyuan Lin says

    November 3, 2021 at 12:38 am

    Cybersecurity concerns grow in Maryland hospitals

    Cyber attacks and security threats received by Maryland hospitals are on the rise. Ransomware attacks and cybersecurity threats have become a major concern for national public health organizations and healthcare institutions. The medical network system is being attacked in real-time, and important medical records of the hospital may be kept confidential. Patients may be misdiagnosed because they are unable to obtain files or cause doctors to be unable to obtain the correct information. According to a Sophos survey, one-third of medical institutions are threatened by data encryption extortion.

    https://www.times-news.com/news/local_news/cybersecurity-concerns-grow-in-maryland-hospitals/article_d222eea8-3a82-11ec-97bd-5b3efe47b9b0.html

    Log in to Reply
  4. Shubham Patil says

    November 3, 2021 at 5:55 pm

    Hackers are stealing data today so quantum computers can crack it in a decade

    Quantum computing promises unprecedented speed and power in computing, it also poses new risks. As this technology advances over the next decade, it is expected to break some encryption methods that are widely used to protect customer data, complete business transactions, and secure communications

    The Department of Homeland Security (DHS) has teamed up with the Department of Commerce’s National Institute of Standards and Technology (NIST) to release a roadmap on the best way for organizations to navigate the transition to post-quantum cryptography.

    DHS’s new guidance will help organizations prepare for the transition to post-quantum cryptography by identifying, prioritizing, and protecting potentially vulnerable data, algorithms, protocols, and systems

    Link: https://www.infosecurity-magazine.com/news/america-prepare-postquantum/

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in