• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.005 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Participation
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Team Project – Updated 3/31/2020
  • Harvard Coursepack
  • Gradebook

In The News

February 6, 2020 by Wade Mackey 12 Comments

Filed Under: 05 - Secure Networks Tagged With:

Reader Interactions

Comments

  1. Percy Jacob Rwandarugali says

    February 7, 2020 at 12:16 pm

    HOW CLOUD COMPUTING WILL BE IN 2020

    Cloud won’t subside in significance at any point in the near future; we’re all dependent upon services distributed by clouds like never before and virtually every time we utilize a connected device. Notwithstanding, in 2020 we may see some new efficiencies, interfaces, connectivity choices and applications themselves in our collaborations with the cloud every day.

    https://www.analyticsinsight.net/how-cloud-computing-will-be-in-2020/

    Log in to Reply
  2. Numneung Koedkietpong says

    February 7, 2020 at 10:32 pm

    The report which the reseacher gather DDoS attacks between May and December 2019 shows that Porn websites are the most target for attackers while the gaming industry website is the second number attack of DDoS. Additionally, the countries which are the highest target are India and Hong Kong respectively.

    https://www.infosecurity-magazine.com/news/porn-sites-suffer-highest-number/

    Log in to Reply
  3. Zeynep Sahin says

    February 7, 2020 at 11:52 pm

    The article entitled “Coronavirus Attacks Aim to Spread Malware Infection” expresses that security experts are warning of new phishing attacks, which exploit the global fear of the spreading corona virus. For example, one such attack is detected which was an email titled “Singapore Specialist: Corona Virus Safety Measures.” And of course, targeted people click on the link in the email will cause to a malware download. Therefore, everyone should be vigilant regarding any emails luring people with giving news about the outbreak by using it as a phishing lure.

    Here is the article: https://www.infosecurity-magazine.com/news/coronavirus-attacks-malware/

    Log in to Reply
  4. Innocent says

    February 9, 2020 at 8:02 pm

    “Well even Facebook is hackable but at least their security is better than Twitter,” the hackers tweeted just before 7 p.m

    According to this report, Facebook’s Twitter account was hacked Friday, apparently by a Saudi-based group that has been active in exposing vulnerabilities among high-profile social media users.
    The group, OurMine, tweeted out a message on Facebook’s account that pointed the social network’s 13.4 million followers to its website. The organization claimed credit for the takeover in an email to NBC News.
    The tweet was quickly taken down. Facebook later tweeted that it had regained control of the account.

    https://www.nbcnews.com/tech/security/facebook-s-twitter-account-hacked-n1132901

    Log in to Reply
  5. Akshay Shendarkar says

    February 9, 2020 at 10:16 pm

    A major XSS vulnerability discovered in the desktop versions of Whatsapp. Currently 15 billion active users connect to their laptops/PC and are at risk of exposing their files to hackers. This article provides the methodology used by hackers to carry out this exploit.

    https://cyware.com/news/using-whatsapp-on-your-computer-could-put-your-files-at-risk-fa24b4d6

    Log in to Reply
  6. Imran Jordan Kharabsheh says

    February 10, 2020 at 2:50 pm

    Title: Critical Citrix RCE Flaw Still Threatens 1,000s of Corporate LANs
    In this article, author Tara Seals informs us of how 1/5th of over 80,000 organizations who have currently implemented the Citrix Application Delivery Controller and the Citrix Gateway are currently at risk of a cyber attack due to a critical vulnerability that was discovered in December. This vulnerability would enable “unauthenticated users to gain remote access to a company’s local network and carry out arbitrary code-execution”. This type of vulnerability leaves the organization open to many forms of malicious attacks including Denial-of-Service and phishing schemes.

    Source: https://threatpost.com/critical-citrix-rce-flaw-corporate-lans/152677/

    Log in to Reply
  7. Joseph Nguyen says

    February 10, 2020 at 5:37 pm

    35 Network Security Tools You NEED According To Experts. I like Nagios, Burp Suite, Metasploit…most of them.

    https://phoenixnap.com/blog/best-network-security-tools

    Log in to Reply
  8. Junjie Han says

    February 10, 2020 at 8:58 pm

    Netherlands University Pays $240,000 After Targeted Ransomware Attack
    The University of Maastricht admitted that it lacked knowledge and control over its own infrastructure.TA505 and Evil Corps used phishing emails to keep attackers on UM’s servers mainstream for more than two months.Goon attackers found one of UM’s servers and left it unpatched.(patch upgrade incomplete)
    https://www.securityweek.com/netherlands-university-pays-240000-after-targeted-ransomware-attack

    Log in to Reply
  9. Natalie Dorely says

    February 10, 2020 at 11:56 pm

    Emotet Spreads Via Newly Discovered Wi-Fi Module

    A malware loader named Emotet spreads itself through any nearby Wifi networks that have a weak password. Mitigation for this includes more secure network passwords and detection strategies through active monitoring of new services being installed and investigating any suspicious acitivity.

    https://www.infosecurity-magazine.com/news/emotet-spreads-via-newly/

    Log in to Reply
  10. Sarah Puffen says

    February 11, 2020 at 10:30 am

    Popular PaaS tool, Docker, has inadvertently exposed the source code of almost 16,000 unique versions of applications owned by various companies and research institutes.
    According to Palo Alto Networks’ Unit 42, the exposure is due to misconfigured container registries that lacked proper network access controls. Docker has commented that while setting up a registry server is rather simple, enforcing access controls requires extra configurations.
    Researchers have stated that when source code and historical versions of applications are exposed, malicious code can be injected, intellectual property can be stolen, and confidential data can be leaked – which could lead to a full-scale compromise, interrupting business operations.

    https://threatpost.com/docker-registries-malware-data-theft/152734/

    Log in to Reply
  11. Peiran Liu says

    February 11, 2020 at 11:18 am

    Research organization CERN will replace Facebook’s Workplace with an open-source alternative after deciding not to move to a new free version of the collaboration software that would eliminate enterprise management features.

    https://www.itworld.com/article/3518890/cern-bails-on-facebooks-workplace-cites-cost.html

    Log in to Reply
  12. Christopher James Lukens says

    February 11, 2020 at 11:53 am

    Why you cant bank on back ups for ransomware anymore

    More often attackers are leveraging stolen data rather than the good faith of decrypting. This also take a look at how to plan for business disruption even if ransomware is contained.

    https://arstechnica.com/information-technology/2020/02/why-you-cant-bank-on-backups-to-fight-ransomware-anymore/

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (6)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in