Temple University

Week 9 Reading Summary, Question, and recent Cyber Security News…

  1. Summarize one key point from each assigned reading…

1A. Regarding more recent malware developments, hackers have been using “cryptolocker” malware to infect & encrypt all files on more high-value networked computer targets, and then demanding $$$ ransoms in exchange for decrypted files. Best defense against malware is a knowledgeable computer user, and using updated computer software (OSes & AV.)

1B. Again regarding malware, “worms” are the most common & cause maximum damage (no host required & self-replicating.) Also an excellent reported set of methods, used to prevent future malware attacks, are the following from the SANS Institute: preparation, identification, containment, eradication, recovery, lessons learned (involves a good combination of policies, procedures, technology, and people.)

  1. Question to classmates (facilitates discussion) from assigned reading…

2A. What is another way that an online global organization can work to help prevent malware attacks on their networked business computer systems?

*Answer: The organization can utilize on-going “anti-malware practices” training for all employees as these type threats evolve.

  1. Identify, read, and post to our blog a current event article regarding ethical hacking & penetration testing (follow theme topic of the week, or other interesting related article)…

In the Cyber Security News lately

Cyber Attack on America’s Thrift Stores exposes credit card numbers (malware-driven security breach which originated from a third-party service provider’s software to process credit card payments)…

http://www.ehackingnews.com/2015/10/cyber-attack-on-americas-thrift-stores.html

Leave a Reply

Your email address will not be published. Required fields are marked *