• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week 5: In the News

September 27, 2020 by Kyuande Johnson Leave a Comment

Nebraska Medicine Falls Victim To Cyber Attack

Nebraska Medicine is the most comprehensive health network in the region, with two major hospitals, more than 1000 doctors and 40 clinics in the Omaha area. Earlier this week Nebraska Medicine experienced a significant information technology system downtime event. This downtime is the result of a cyber security attack.  Nebraska Medicine was forced to postpone many appointments and prioritized patients who have appointments or surgeries critical to their health and well-being. According to Nebraska Medicine no patient data has been deleted or destroyed. As of this time there is no report of Patient data being compromised. Law Enforcement have been notified and contingency plans are in place. Nebraska Medicine says normal operations should resume in a few days after the cyber attack. 

The statement did not include any further information about the attack’s nature, extent or origins. According to the distribution and event leading to the discovery of the attack. It seems that Nebraska Medicine has been affected by a denial of service attack. As this investigation continues Nebraska Medicine and other health institutions should seek to improve their Security Awareness. Training employees to watch out for suspicious links and always updating phone and computer software is essential . Nebraska Medicine should also improve defense-in-depth or layered security. Layered Security provides additional protection even after an unauthorized access is achieved. Even if an attacker is able to breach into the network.What they can access is very limited. Which is going to make accessing other data more difficult.

Filed Under: Week 05: Metasploit Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in