• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.005 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Participation
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Team Project – Updated 3/31/2020
  • Harvard Coursepack
  • Gradebook

In The News

January 23, 2020 by Wade Mackey 12 Comments

Filed Under: 03 - Planning and Policy Tagged With:

Reader Interactions

Comments

  1. Akshay Shendarkar says

    January 24, 2020 at 3:25 pm

    Senators from multiple states are championing for the dedicated cyber security leader for each state and proposing a new bill to bolster the state and local governments’ cyber security posture.

    https://cyware.com/news/new-bill-proposes-cyber-leaders-for-each-us-state-fd126fe7

    Log in to Reply
  2. Numneung Koedkietpong says

    January 24, 2020 at 8:17 pm

    The personal information (PII) including name, date of birth, email, and medical ID records for cannabis users was compromised via software THSuite which is located in Amazon Web Services (AWS) S3. The reason of this data breach was from misconfiguration in cloud without any authentication or security in place. This problem was detected on Dec 24, 2019 and already solved by Jan 14, 2020

    https://www.infosecurity-magazine.com/news/data-30000-cannabis-users-exposed/

    Log in to Reply
  3. Zeynep Sahin says

    January 24, 2020 at 11:25 pm

    The article entitled “We’re Going to Need a Better Plan” emphasis the necessity and importance of having security plan. The article draws attention about the growing number of cyber-attacks against SCADA based environments within manufacturing. Although, companies mostly spend their budget for defense, they cannot prevent increase of attacks because without uncovering potential vulnerabilities, even the strongest defense methods are useless. Some recommendation that the article expresses are security assessment, audit, attacker profiling, and continuous monitoring.

    For details here is the article: https://www.infosecurity-magazine.com/opinions/need-better-plan/

    Log in to Reply
  4. Percy Jacob Rwandarugali says

    January 25, 2020 at 12:41 pm

    Facebook’s Sir Nick Clegg criticised over WhatsApp security:

    Security researchers have criticised Facebook’s head of communications, Sir Nick Clegg, for his response to the hacking of Amazon chief Jeff Bezos.
    Mr Bezos’ phone was hacked in May 2018 after he received a WhatsApp message loaded with malware. But in an interview with the BBC, Sir Nick said WhatsApp’s encrypted messages could “not be hacked into”. And he failed to acknowledge security flaws in the app that had let hackers compromise their target’s smartphones.

    https://www.bbc.com/news/technology-51235815

    Log in to Reply
  5. Natalie Dorely says

    January 26, 2020 at 9:47 pm

    https://www.infosecurity-magazine.com/news/us-warnings-over-flawed-medical/

    There have been warnings circulating in the US in regards to flawed medical devices. These can be hacked by unauthorized users can cause the devices to be silent to alarms, create false alarms, or disable the device all together.

    Log in to Reply
  6. Joseph Nguyen says

    January 26, 2020 at 11:55 pm

    An expert at AI-based offers his look ahead at the year – focusing on AI, cybersecurity, and interoperability. He predicts that In 2020, AI will aid administrators and CISOs regarding internal company security.

    https://www.healthcareitnews.com/news/2020-ai-will-aid-administrators-and-cisos-will-refresh-internal-security

    Log in to Reply
  7. Junjie Han says

    January 27, 2020 at 6:56 pm

    The Google and Firefox networks suspended the availability of paid Add-ons for the browser.While this is temporary, it can be deadly for suppliers.The increase in fraud has led Google and Firefox to re-audit the extensions.
    Many of those marked for attention are thought to have been executing code from remote servers, installing malware, deliberately hiding code or eavesdropping on user searches.
    https://www.infosecurity-magazine.com/news/chrome-firefox-clamp-down/

    Log in to Reply
  8. Imran Jordan Kharabsheh says

    January 28, 2020 at 3:52 am

    This article, written by Tara Seals, discusses the recent disciplinary activities that both Mozilla and Google have taken against web browser extensions that actively or have the potential to be malicious. While browser extensions are easy to install and can simplify or enhance our browsing experience, they can also compromise users either intentionally or unintentionally by exploiters. Some of these compromising cases include users having their PII stolen or having remote code being executed on their computers.
    Source: https://threatpost.com/google-mozilla-ban-browser-extensions-chrome-firefox/152257/

    Log in to Reply
  9. Alexander Reichart-Anderson says

    January 28, 2020 at 8:26 am

    This week in the news I explored a flaw that allowed hackers to access zoom meetings by guessing a meeting ID. Since Zoom is the new group/class video client used by Temple, its students, and teachers — I thought this was a very relevant article. The bug was corrected by actually recoding the security client/software used by Zoom. Hackers were able to inject a code into the URL and gain access through that. However, by recoding the software, the meeting IDs are more secure leading to better video calls.

    https://threatpost.com/zoom-fixed-flaw-opening-meetings-to-hackers/152266/

    Log in to Reply
  10. Christopher James Lukens says

    January 28, 2020 at 11:06 am

    Maryland bill will outlaw ransomware but impose difficulties on security researchers. The bill currently still in draft, has little no no exclusions for research and would make possessing ransomware illegal. The other difficulty is that the vast majority of ransomware stems from out side the united states and it would be quite difficult to extradite someone to the US because of a broken state law.

    https://arstechnica.com/information-technology/2020/01/good-news-maryland-bill-would-make-ransomware-a-crime/

    Log in to Reply
  11. Innocent says

    January 29, 2020 at 12:36 am

    UK’s IoT Law Hopes to Drive Security-by-Design

    The UK Government has introduced a new consumer IoT law designed to prohibit the sale of smart products that fail to meet three strict security requirements. This proposal would ensure all IoT kit sold in the UK allows users to set unique passwords and not revert them to any factory settings. This will help to reduce the scourge of Mirai-like malware, which finds exposed devices on the internet and cracks them open with a list of popular default password choices. It will also require manufacturers of IoT devices to provide a public point of contact so that anyone can report vulnerabilities and have them acted on “in a timely manner”. Also, the IoT Kit-makers would have to state the minimum length of time a device will receive security updates at point-of-sale, allowing consumers to decide whether they’re happy with vendor promises.

    https://www.infosecurity-magazine.com/news/uks-iot-law-hopes-to-drive/

    Log in to Reply
  12. Peiran Liu says

    April 1, 2020 at 12:17 pm

    27 JAN 2020

    Both Chrome and Firefox administrators have had to take action recently to halt the spread of malware via extensions and add-ons.

    Google developer advocate Simeon Vincent explained over the weekend that the Chrome Web Store team detected an increase in fraudulent activity earlier in the month attempting to exploit users of the popular browser.

    https://www.infosecurity-magazine.com/news/chrome-firefox-clamp-down/

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (6)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in