• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project

In the News

September 7, 2023 by David Lanter 8 Comments

Filed Under: Unit 03: Risk Evaluation Tagged With:

Reader Interactions

Comments

  1. Celinemary Turner says

    September 10, 2023 at 11:23 pm

    Smaller Companies Must Embrace Risk Management
    by Ariane Chapelle
    September 08, 2023
    https://hbr.org/2023/09/smaller-companies-must-embrace-risk-management
    There are accepted rules for effective risk management: vigilance is key, and rapid intervention reduces impact. “If you see something, say something” is the New York City Subway’s motto to prevent terrorist attacks. “See it, say it, sorted” is the equivalent for the London Underground.
    Managing risks is inseparable from managing performance. Positive risk management aims to capture the upside of uncertainty, and to prevent the downside as much as possible.

    Log in to Reply
  2. Nicholas Nirenberg says

    September 12, 2023 at 12:57 pm

    https://www.infosecurity-magazine.com/news/us-government-ordered-patch-apple/
    The US Cybersecurity and Infrastructure Security Agency (CISA) has ordered US government agencies that use Apple devices to update them within the month to patch recently discovered zero-day vulnerabilities. These vulnerabilities leave the devices open to potential spyware by gaining access to the system through a buffer overflow in ImageIO. Another vulnerability occurs through Apple Wallet, in which a malicious packet may result in code execution. This comes after a 2021 incident where it was found that nine US state department officials had their iPhones hacked by spyware made by NSO Group, a commercial Israeli malware company.

    Log in to Reply
  3. Ooreofeoluwa Koyejo says

    September 12, 2023 at 3:53 pm

    Social Engineering Attacks Targeted at IT Admins

    https://blog.knowbe4.com/social-engineering-okta-credentials Sept 7
    https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection Aug 31

    The attackers used social engineering tactics aimed at convincing the IT service desk personnel within organisations reset the MFA factors/administrative privileges of highly privileged users of US based Okta customers which would then leverage their compromise of highly privileged Okta Super Administrator accounts to abuse legitimate identity federation features that enabled them to impersonate users within the compromised organization that enabled them to impersonate users within the compromised organization.

    Okta is an identity and authentication management provider, multiple reports with similar patterns were made to okta by their tenant clients.

    These recent attacks highlight why protecting access to highly privileged accounts is so essential.

    Log in to Reply
  4. Jon Stillwagon says

    September 12, 2023 at 5:01 pm

    https://thehackernews.com/2023/09/vietnamese-hackers-deploy-python-based.html
    This news article is about Vietnamese hackers that use Python-based stealer to send to people on Facebook Messenger. It is a multi-stage process that is meant to steal your business account. The hackers target business accounts that basically send them messages to entice them to click on them. Then it leads them to delete all cookies and login credentials but before it deletes all the cookies it takes them from you first. Once they have your stolen cookies they then use them to change your passwords and to take control of them. Then sends the stolen data out to be sold on the market. 1 out of 250 victims are expected to be affected in the last 30 days which uses a tiny compressed file that is attached and sent to the potential victim.

    Log in to Reply
  5. Nicholas Nirenberg says

    September 12, 2023 at 7:32 pm

    https://www.infosecurity-magazine.com/news/us-government-ordered-patch-apple/
    The US Cybersecurity and Infrastructure Security Agency (CISA) has ordered US government agencies that use Apple devices to update them within the month to patch recently discovered zero-day vulnerabilities. These vulnerabilities leave the devices open to potential spyware by gaining access to the system through a buffer overflow in ImageIO. Another vulnerability occurs through Apple Wallet, in which a malicious packet may result in code execution. This comes after a 2021 incident where it was found that nine US state department officials had their iPhones hacked by spyware made by NSO Group, a commercial Israeli malware company

    Log in to Reply
  6. Edge Kroll says

    September 12, 2023 at 8:56 pm

    https://www.securityweek.com/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-errors/

    This article explains how Microsoft has released a report revealing multiple mistakes that allowed Chinese hackers to breach U.S. government emails. The incident was attributed to a crash dump taken from a compromised engineer’s corporate account in April 2021, which contained a Microsoft account (MSA) consumer key used to create tokens for unauthorized access to OWA and Outlook.com accounts. The report cited a race condition issue that permitted the key’s inclusion in the crash dump, which has since been fixed. Microsoft also acknowledged the failure of its internal systems to detect sensitive data leaks from crash dumps. Furthermore, the company does not possess specific logs of the exfiltration, leading to criticism of its M365 licensing structure and prompting plans to enhance logging defaults and data retention for lower-tier customers.

    This security breach resulted in the theft of emails from around 25 organizations and led to U.S. Senator Ron Wyden’s call for Microsoft to be held accountable for “negligent cybersecurity practices” that facilitated the Chinese espionage campaign against the U.S. government. The U.S. government has initiated an investigation by its Cyber Safety Review Board (CSRB) into the Microsoft cloud hack and related issues concerning cloud-based identity and authentication infrastructure.

    Log in to Reply
  7. Bo Wang says

    September 12, 2023 at 10:26 pm

    https://www.infosecurity-magazine.com/news/cybercriminals-jailbreak-ai/
    Criminals use AI vulnerabilities to avoid asking questions that violate the law. It is possible to use AI to hack.

    Log in to Reply
  8. Yannick Rugamba says

    September 17, 2023 at 1:00 pm

    https://www.fiercepharma.com/pharma/merck-targeted-global-ransomware-attack.

    This article is about a cyber attack that targeted global entities, including the pharmaceutical company Merck & Co.

    In 2017 on a Tuesday Merck & Co. along, with other global companies and government ministries in Ukraine became victims of a significant ransomware attack. The pharmaceutical giant publicly acknowledged the cyber intrusion through their Twitter account. Did not immediately provide information. Experts named the ransomware “Petya,” which encrypts computers and demands a ransom for restoring user access. This attack impacted companies in France, England, Russia and other countries. The presence of the ransomware was identified at Merck locations, in Pennsylvania and New Jersey.

    The article highlights the increasing cyber threats. Mentions that this is not the time a major pharmaceutical company has faced such an attack. According to Symantec’s report between January 2014 and June 2015 hackers successfully breached systems belonging to three pharmaceutical firms with the aim of obtaining valuable information that could affect stock prices.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in