• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project

In the News

August 29, 2023 by David Lanter 5 Comments

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

Reader Interactions

Comments

  1. Jon Stillwagon says

    September 4, 2023 at 1:10 pm

    https://www.infosecurity-magazine.com/news/sydney-university-suffers-supply/
    A supply chain-related data breach occurred at the university of Sydney where personal information about their international students and people who have applied to the university was accessed. A limited number of international staff and students were impacted by the data breach. The university has no evidence of what kind of information was breached or how many of their students/applicants were compromised. The university had already taken measures into place and contacted relevant cybersecurity authorities and implemented a cybersecurity list of best control measures for the students to follow. The university is ranked among the top 20 in the world which makes it a prime target for attackers to get information about their students and faculty. Luckly the attack had no impact on other universities. The university kept in contact with the students that got their information breached and they kept monitoring their systems.

    Log in to Reply
  2. Akiyah says

    September 5, 2023 at 5:19 pm

    https://www.reuters.com/technology/tiktok-hires-britains-ncc-auditing-data-security-2023-09-05/

    I am not surprised that “several government bodies” are have banned Tik Tok from staff phones. I don’t believe the App has any business on company phones (in the majority of cases) even prior to this policy under existing Acceptable Use policies.

    What about staff that use their personal phones for work? How are companies going to safeguard their information if they do not own the device?

    Log in to Reply
  3. Nicholas Nirenberg says

    September 5, 2023 at 8:24 pm

    The ransomware attack group LockBit was recently responsible for an attack on Zaun, a UK based manufacturer of fencing systems, which potentially exposed gigabytes of sensitive data relating to the British military. Despite the company’s proclaimed up-to-date network, the attackers were able to find a vulnerable entry point, a machine running Windows 7, and used it to attempt a ransomware attack. Fortunately for Zaun, their cyber security solution prevented any file encryption, but the attackers were still able to download some data, from at least the vulnerable machine and possibly their server. They claim the data which was potentially downloaded included “historic emails, orders, drawings and project files.” In response Zaun has removed the vulnerable machine from their network and claims sensitive data was not breached, and that the data could not be more beneficial to criminals than already publicly available data. However, other sources disagree and claim the data which was stolen could help criminals in accessing British military installations. In the wake of the breach some members of the British parliament have voiced concerns, while Zaun holds firm and says that because they install high security fencing which is visible to the public, it is unlikely that the attackers obtained information which would be considered sensitive.
    https://www.infosecurity-magazine.com/news/sensitive-data-uk-army-potentially/

    Log in to Reply
  4. Bo Wang says

    September 10, 2023 at 4:22 pm

    https://www.infosecurity-magazine.com/news/gpus-graphic-design-software/
    Criminals use bundled installations to get victims to install malware, which can often run secretly in the background and consume only a fraction of available resources.

    Log in to Reply
  5. Ooreofeoluwa Koyejo says

    September 12, 2023 at 9:45 pm

    Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack
    https://thehackernews.com/2023/08/kroll-suffers-data-breach-employee.html

    Kroll is a risk and financial advisory solutions provider, released a statement on data breach security incident that happened through a successful SIM swapping attack(transfer of someone’s number to another perosn’s) on an employee’s T-Mobile number to access their online accounts and files containing personal information of some bankruptcy claimants.

    SIM swapping (aka SIM splitting or simjacking), is a process where a threat actor fraudulently activates a SIM card under their control with a victim’s phone number which makes it possible to intercept SMS messages, voice calls and receive MFA-related messages that control access to online accounts identified or discovered through phishing or social media this way, the threat actor can convince the cellular carrier to port the victims’ phone numbers to one of their own SIM cards.

    Lessons Learnt: the frequency of SIM swapping attacks is a reminder for users to reduce the use of SMS-based two-factor authentication (2FA) and switch to phishing-resistant methods such as authenticator apps, codes via email verification to secure online accounts.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in