• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.005 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Participation
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Team Project – Updated 3/31/2020
  • Harvard Coursepack
  • Gradebook

In The News

January 30, 2020 by Wade Mackey 13 Comments

Filed Under: 04 - Cryptography Tagged With:

Reader Interactions

Comments

  1. Zeynep Sahin says

    January 30, 2020 at 2:27 pm

    Microsoft announced that new privacy-focused assessments available in the public preview of Microsoft Compliance Score. Risk and compliance professionals can assess controls by using Microsoft Compliance Score to score their compliance to of GDPR, ISO 27001, ISO 27018, NIST CSF, NIST 800-53, HIPAA, FFIEC, and more. And, also, they’ve just released new California Consumer Privacy Act (CCPA) assessment. It may help organizations to keep up with rapidly changing regulatory requirements.

    Here is the article: https://www.microsoft.com/security/blog/2020/01/27/new-privacy-assessments-now-included-in-microsoft-compliance-score/

    Log in to Reply
  2. Percy Jacob Rwandarugali says

    February 1, 2020 at 6:06 am

    Storing data in everyday objects

    Researchers have discovered a new method for turning nearly any object into a data storage unit. This makes it possible to save extensive data in, say, shirt buttons, water bottles or even the lenses of glasses, and then retrieve it years later. The technique also allows users to hide information and store it for later generations. It uses DNA as the storage medium.

    https://www.sciencedaily.com/releases/2019/12/191209110529.htm

    Log in to Reply
  3. Numneung Koedkietpong says

    February 1, 2020 at 9:28 am

    The anonymous security researcher found the vulnerabilities of Indian airline “SpiceJet” by using the a brute-force attack. He could able to gain unauthorized access to unencrypted database backup file which include PII data such as passengers’ name, phone number, email, and birthday. This was a big concern to SpiceJet that they should realize about this issue and review security plan and control safeguards to protect and detect cyber-attacks.

    https://www.infosecurity-magazine.com/news/breach-at-indian-airline-affects/

    Log in to Reply
  4. Akshay Shendarkar says

    February 1, 2020 at 8:04 pm

    SEC releases cyber security and resiliency best practices

    There are specific guidelines for Governance and management of security Risks.
    This article also highlights specific examples of cybersecurity and operational resiliency practices and controls which are followed by some of the more mature organizations who have been successful in thwarting cyber attacks.

    https://www.securitymagazine.com/articles/91638-sec-cybersecurity-and-resiliency-best-practices

    Log in to Reply
  5. Joseph Nguyen says

    February 2, 2020 at 11:17 pm

    It s not a joke, that the pentesters were jailed for the work that they were asked and paid for!

    https://arstechnica.com/information-technology/2020/01/criminal-charges-dropped-against-2-pentesters-who-broke-into-iowa-courthouse/

    Log in to Reply
  6. Imran Jordan Kharabsheh says

    February 3, 2020 at 12:39 pm

    Japanese Electronics Giant NEC Discloses Old Data Breach
    It was recently disclosed by the Japanese IT and electronics company that they had been compromised for a lengthy period of time, approximately 2 years. After an investigation, it was determined that the hackers had accessed 27,445 files on the company’s servers, however “these files did not contain confidential information or personal information” the company stated. The article has also mentioned that NEC has taken steps to improve their cyber security initiatives by improving and implementing incident response, sensitive information management and improved early detection and response systems.

    Source: https://www.securityweek.com/japanese-electronics-giant-nec-discloses-old-data-breach

    Log in to Reply
  7. Natalie Dorely says

    February 3, 2020 at 4:09 pm

    The Maze ransomeware has stolen personal data from at least five law firms, and the Bouygues Construction company.

    https://www.infosecurity-magazine.com/news/maze-ransomware-law-firms-french/

    Log in to Reply
  8. Christopher James Lukens says

    February 3, 2020 at 10:58 pm

    A summary of the biggest trends in security coming in 2020
    some of the points include
    -Cloud as a continued target
    -Machine learning increasingly used by hackers in campaigns
    -more ransomware
    – and more mobile targeted attacks

    https://threatpost.com/2020-cybersecurity-trends-to-watch/151459/

    Log in to Reply
  9. Innocent says

    February 3, 2020 at 11:46 pm

    TILAMOOK COUNTY IS YET TO FULLY RECOVER FROM A RANSOMWARE ATTACK.

    According to this artcile, a county in the Pacific Northwestern state of Oregon is yet to fully recover from a ransomware attack that happened over a week ago.
    Cyber-criminals hit Tillamook County in a targeted attack on Wednesday, January 22. As a result, all internal computer systems under the county government, which 250 county employees rely on, went down.
    The Tillamook County website, which hosts numerous departments, was also taken out in the incident. Other network connections were disabled to contain the spread of the malware.
    The Emergency Communications District’s dispatch and 911 services were not affected; however, the County Sheriff’s Office has experienced some issues with its phone system and email.
    On Monday, January 27, Tillamook County commissioners voted unanimously to negotiate with the cyber-attackers for an encryption key in a bid to regain control of the government’s computer systems.

    https://www.infosecurity-magazine.com/news/tillamook-county-ransomware-attack/

    Log in to Reply
  10. Alexander Reichart-Anderson says

    February 4, 2020 at 11:22 am

    Malware downloads integrated with a phishing scam? The notorious cyber crime group Evil Corp is back, attempting to disrupt and scam Microsoft by encoding their emails with links that will automatically download a malicious excel file. If authorized by the user, the file will begin its download to the hardware and certainly ruin someones week.

    https://threatpost.com/evil-corp-returns-with-new-malware-infection-tactic/152430/

    Log in to Reply
  11. Sarah Puffen says

    February 4, 2020 at 11:45 am

    Research has shown that new autopilot systems, like in Tesla’s Model X, can be tricked into perceiving projected images as being real, causing the car to brake or steer into oncoming traffic.

    These types of “phantom attacks” have yet to be seen “in the wild,” however, they are not difficult to execute. The attacks are not necessarily a security vulnerability, but they do exploit a major flaw within advanced driving assistance systems.

    https://threatpost.com/tesla-autopilot-duped-by-phantom-images/152491/

    Log in to Reply
  12. Peiran Liu says

    February 4, 2020 at 5:43 pm

    A British community housing charity was conned out of more than $1m in a domain spoofing and contractor impersonation scam.

    Red Kite Community Housing announced on Tuesday that it had fallen victim to a cyber-scam in which criminals posed as genuine service providers to steal a staggering £932,000.

    https://www.infosecurity-magazine.com/news/red-kite-spoofing-scam/

    Log in to Reply
  13. Junjie Han says

    February 4, 2020 at 10:10 pm

    Australian transport and logistics giant Toll Group has been forced to shut down some of its online services in response to a ransomware attack.
    More than 1,000 servers were infected with ransomware, rendering Toll Group unable to conduct business.There have been no reports of personal data being compromised.Although the tough measures cause economic losses, I think it is the right choice to protect customers’ personal information.
    https://www.securityweek.com/australian-shipping-giant-toll-hit-ransomware

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (6)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in