Categories
Computer science : Cybersecurity

This week I’d like you to explore how emanations from computers or mobile device

This week I’d like you to explore how emanations from computers or mobile devices can pose a threat to an organization. As part of your posting, I’d like you to do the following:
1) Identify how an adversary could use emanations to steal data from an organization and then explain how this is a cyber security-related problem.
2) Define any constraining factors associated with this approach.
3) Identify different safeguards that can be put into place to prevent such threats.
4) Find and summarize one news article or piece of academic research on how emanations have been used/exploited to compromise the security of an organization.
Like previous posts, please provide citations.
Note: Emanation security/threat is not the same as wireless security/threat. Any posting about wireless security/threat will receive a 0 for the discussion posting.

Categories
Computer science : Cybersecurity

Review the following videos that outline the Starbucks sourcing philosophy: Vide

Review the following videos that outline the Starbucks sourcing philosophy:
Video 1: Follow Starbucks’ 15 Year Journey to 100% Ethically Sourced Coffee (2:00)
Video 2: Responsible Coffee Practice: Plant and Protect: Conservation International (CI) (5:17)
Video 3: What Is an Agronomist? (1:18)
How will the company’s philosophy affect the cost and efficiency of its operation? Is Starbucks able to balance the triple bottom line and reinforce its culture of corporate and social responsibility? In other words, does Starbucks successfully fulfill environmental and social responsibilities while maintaining financial success? How should Starbucks prioritize its financial, environmental, and social investments to achieve long-term success?
In your responses to your peers’ posts, comment on whether you think their prioritizations will be successful in the long term. Have your peers placed too much emphasis on one element of the triple bottom line over another? How is this going to impact the sustainability of their operations?

Categories
Computer science : Cybersecurity

This week I’d like you to explore how emanations from computers or mobile device

This week I’d like you to explore how emanations from computers or mobile devices can pose a threat to an organization. As part of your posting, I’d like you to do the following:
1) Identify how an adversary could use emanations to steal data from an organization and then explain how this is a cyber security-related problem.
2) Define any constraining factors associated with this approach.
3) Identify different safeguards that can be put into place to prevent such threats.
4) Find and summarize one news article or piece of academic research on how emanations have been used/exploited to compromise the security of an organization.
Like previous posts, please provide citations.
Note: Emanation security/threat is not the same as wireless security/threat. Any posting about wireless security/threat will receive a 0 for the discussion posting.

Categories
Computer science : Cybersecurity

Background: Vulnerability scanners are used to identify the security flaws of an

Background: Vulnerability scanners are used to identify the security flaws of an existing web application. Acunetix is a web application scanner that performs comprehensive tests on the web application to identify its vulnerabilities and provided relevant reports to the analyst. In this document the value is to understand web page vulnerabilities that can be compromised by a hacker.
Instructions
Please address the following:
1.    What kind of attacks are possible on a website based on the vulnerabilities identified through Acunetix software.
2.    What are some of the factors that can cause software vulnerabilities?
3.    A case study on Acunetix quotes 30K website attacks daily and 90% password vulnerabilities in 2013. What are current website attacks and password vulnerability statistics? Please give reasons and impact of the increase to date.

Categories
Computer science : Cybersecurity

Background: Reconnaissance is a form of information gathering, and it is the fir

Background: Reconnaissance is a form of information gathering, and it is the first step in hacking. Excessive information can help hackers perform attacks on a target organization. Hence, this document, will analyze a website and identify the amount of information exposed by them online.
Please address the following:
•    What is the latest and most serious vulnerability in technology as noted in the National Vulnerability Database?
•    How is this information useful in identifying threats to a system?
•    How can this information be used to protect the system?

Categories
Computer science : Cybersecurity

Please explain if RMF or the other Risk Management approach is better or not. Ge

Please explain if RMF or the other Risk Management approach is better or not.
Generally, companies should only adopt one frame of risk management for themselves, as having multiple could introduce problems. Clashing or contradictory guidelines for specific scenarios could lead to confusion and havoc in dire sitruations or a lack of proper management, allowing for more risk to occur. Having only one framework to follow avoids those problems, and also allows for better external help and support from other entities using a similar framework, should the need for that ever arise. When it comes to picking between the Cobit RMF or the NIST RMF, as mentioned earlier, that is ultimately the choice of the company’s leaders in security. They know best on what the needs of the company are, and how they personally feel like the company will benefit from a specific framework with its specific guidelines.
We as a group agreed that despite the variability in function and effectiveness from framework to framework, the NIST RMF is more applicable to any IT-related companies. A reason for this decision was that the NIST RMF can used as a reactionary guideline more so than Cobit. A NIST document like the 800-61 is a prime example of this, as this is a publication of 79 pages on how to detect, analyze, prioritize, handle and respond to incidents that may occur. Also, with the widely used 800-53(A), found within it are specific security and privacy practices designed to be used for any company, as opposed to the governance-based applications of Cobit.
Another reason why we believed the NIST RMF to be better than the Cobit RMF was that NIST is an actual part of the US government, more specifically the Department of Commerce. While some individuals may question the governments internal intentions or level of awareness towards situations for companies around the world, the one sure thing that they do for the country is keep it running whether those individuals may like it or not. The Department of Commerce specializes in keeping America functioning financially, and them backing NIST and helping to develop framework policies is one of the more trustworthy things out there. Another way to think about this comparison is if you wanted to ask a pioneer of modern mathematics like

Pythagoras or Isacc Newton for guidance on a math question, versus your math professor who knows all about math, but doesnt have the deep knowledge and experience with it like the former great minds of mathematics who essentially created it did.

Categories
Computer science : Cybersecurity

Read the pdf – task 4 +  grading system information . ————————–

Read the pdf – task 4 +  grading system information .
——————————————
Understand how CNI has been targeted by state-backed cyber-crime groups and/or armies
4.1: Assess how attacks on Critical National Infrastructure can impact a business’s access to its information systems
4.2: Assess measures to lessen an organization’s risk profile
——————————————–
please check the uploaded ppt file to show you what information we took this week.
——————————————–
2 mini ref’s

Categories
Computer science : Cybersecurity

Week 5 Discussion – “Exploiting Trusted Relationships” Your discussion posting a

Week 5 Discussion – “Exploiting Trusted Relationships”
Your discussion posting assignment for this week is to examine how adversaries can exploit trusted vendor-to-consumer relationships and describe how they violate the CIA triad by providing an example of this happening (who, what, where, why, when, etc.). For instance, the NotPetya attack compromised an Ukranian tax accounting software called M.E. Doc then used it to spread malware onto every company that used this software. In another example, Target was hacked through a trusted contractor’s system who was responsible for managing its HVAC system. If possible, provide examples where your APT actors has abused a trusted relationship to gain access to systems or stolen information from the  managed security service providers (MSSPs)  (sometimes just MSP) to enhance its evasion techniques. Alternative, a software supply chain attack would also count as a “trusted relationship”. Note: a data breach does not count as a trusted relationship and will result in a score of 0 for the posting if you elect to use this as an example.
For the purpose of this discussion, I’ll bound the scope to software solutions (antivirus, finance/hr/account software, etc.),  MSSPs, or other 3rd party relationships between organizations. Also, please provide citations as applicable.

Categories
Computer science : Cybersecurity

Week 5 Discussion – “Exploiting Trusted Relationships” Your discussion posting a

Week 5 Discussion – “Exploiting Trusted Relationships”
Your discussion posting assignment for this week is to examine how adversaries can exploit trusted vendor-to-consumer relationships and describe how they violate the CIA triad by providing an example of this happening (who, what, where, why, when, etc.). For instance, the NotPetya attack compromised an Ukranian tax accounting software called M.E. Doc then used it to spread malware onto every company that used this software. In another example, Target was hacked through a trusted contractor’s system who was responsible for managing its HVAC system. If possible, provide examples where your APT actors has abused a trusted relationship to gain access to systems or stolen information from the  managed security service providers (MSSPs)  (sometimes just MSP) to enhance its evasion techniques. Alternative, a software supply chain attack would also count as a “trusted relationship”. Note: a data breach does not count as a trusted relationship and will result in a score of 0 for the posting if you elect to use this as an example.
For the purpose of this discussion, I’ll bound the scope to software solutions (antivirus, finance/hr/account software, etc.),  MSSPs, or other 3rd party relationships between organizations. Also, please provide citations as applicable.

Categories
Computer science : Cybersecurity

Read the pdf – task 1 +  grading system information . ————————–

Read the pdf – task 1 +  grading system information .
——————————————
Understand how nation states are potentially engaged in cyber defense and offensive capability strategy. 
1.1: Explain the terms ‘geopolitics’ and ‘state sponsored/ sanctioned’ as they apply to considerations for information security
1.2: Assess the threats and risks to businesses from emerging nation-state cyber ‘warfare’ capabilities.
——————————————–
please check the uploaded ppt file to show you what information we took this week.
——————————————–
2 mini ref’s