4:50 pm, May 30, 2015

Search Result

Search Tags:  The Cyber Security Report

Online shopping rules evolve

How do you shop securely online. The Center for Internet Security says you should "know your online merchants. Limit online shopping to merchants you know and trust. Only go to sites by directly typing the URL in the address bar. If you are unsure about a merchant, check with the Better Business Bureau or the Federal Trade Commission to ensure its legitimacy. Confirm the online seller's contact information in case you have questions or problems. Use a credit card, not a debit card. Credit cards are protected by the Fair Credit Billing Act and may reduce your liability if your information is used improperly.

Tags: UMUC , J.J. Green , cyber security

Tuesday - 01/21/2014, 10:25am EST

Evidence of system hacks varies

How can you tell if your system has been compromised? Internet security firm Mandiant says there are numerous signs. Included are evidence of unauthorized use of valid accounts, trace evidence & partial files, command and control activity, known and unknown malware, suspicious network traffic, valid programs used for other purposes and files that have obviously been accessed by attackers. IT managers are reminded that threats can slip in undetected and lay dormant for long periods of time before striking.

Tags: UMUC , J.J. Green , cyber security

Tuesday - 01/21/2014, 10:26am EST

Britain pulls plug on spy cans

Officials say that an advertising firm must immediately stop using its network of high-tech trash cans to track people walking through London's financial district. The City of London Corporation says it has demanded Renew pull the plug on the program, which measures the Wi-Fi signals emitted by smartphones to follow commuters as they pass the garbage cans.

Tags: Cybersecurity , cyber security , J.J. Green , UMUC

Tuesday - 10/08/2013, 10:51am EDT

Adobe Source Code stolen

Kelly Jackson Higgins wrote in her "Hacking The Adobe Breach" column, "At first glance, the massive breach at Adobe that was revealed last week doesn't neatly fit the profile of a pure cybercrime attack." She said not only did the bad guys steal customer data and payment info, but they also got ahold of the company's source code for Adobe's ColdFusion, Acrobat, and Reader software. Criminal investigators are looking into whether it was an accident or they deliberately went after the source code.

Tags: cyber security , Cybersecurity , J.J. Green , UMUC

Tuesday - 10/08/2013, 10:53am EDT

Security leaks could affect legislation

Recent revelations about secret U.S. surveillance programs could significantly impede progress on negotiations over new laws and regulations meant to beef up the country's defenses against the growing threat of cyber-attacks. Current and former cyber security officials say they worry the ongoing disclosures about secret National Security Agency spying programs by former NSA contractor Edward Snowden could trigger knee-jerk reactions by Congress or the private sector.

Tags: UMUC , cyber security , Cybersecurity , J.J. Green

Tuesday - 08/13/2013, 12:32pm EDT

How does DHS respond to Cyber incidents?

How does DHS detect and respond to malicious cyber activity. DHS also operates a cyber-information coordination center, the National Cybersecurity and Communications Integration Center (NCCIC), and several operational units. These units respond to incidents and provide technical assistance to information system operators. The NCCIC coordinates the information collected through these channels to create a common operating picture for cyber communities across all levels of government and the private sector.

Tags: UMUC , cyber security , Cybersecurity , J.J. Green

Tuesday - 08/13/2013, 12:30pm EDT

Is your computer vulnerable?

How do you know if your computer is vulnerable to cyber-attack? USCERT The U.S. Computer Emergency Readiness Team. says many computers are sold with software already loaded. Whether installed by a computer manufacturer, operating system maker, Internet Service Provider, or by a retail store, USCERT says the first step in assessing the vulnerability of your computer is to find out what software is installed and how one program will interact with another. Unfortunately, it is not practical for most people to perform this level of analysis.

Tags: UMUC , Cybersecurity , cyber security , J.J. Green

Tuesday - 08/13/2013, 12:29pm EDT

Understanding DHS's role in cyber security

What is DHS's role in cyber security. DHS uses intrusion detection tools to monitor .gov network traffic for malicious activity and uses this resulting data to address cyber vulnerabilities. In addition, DHS issues bulletins and alerts that provide information on potential cyber threats. Last year, DHS issued more the 5,000 alerts and advisories, which it shared with various government, private sector, and critical infrastructure stakeholders; as well as the public.

Tags: UMUC , cyber security , Cybersecurity , J.J. Green

Tuesday - 08/13/2013, 12:27pm EDT

Looking inside cyber-criminal organizations

Cyber criminals --what's their M.O.? USCERT says Attackers focus on exploiting client-side systems (your computer) through various vulnerabilities. They use these vulnerabilities to take control of your computer, steal your information, destroy your files, and use your computer to attack other computers. A low-cost way attackers do this is by exploiting vulnerabilities in web browsers. An attacker can create a malicious web page that will install Trojan software or spyware that will steal your information.

Tags: UMUC , Cybersecurity , cyber security

Tuesday - 08/13/2013, 12:26pm EDT

DHS working on Cyber Security Framework

To promote cyber security practices and develop these core capabilities, DHS says it is working with critical infrastructure owners and operators to create a Cyber security Framework - a set of core practices to develop capabilities to manage cyber security risk. These are the known practices that many firms already do, in part or across the enterprise and across a wide range of sectors. The draft Framework will be complete in October.

Tags: UMUC , cyber security , Cybersecurity , J.J. Green

Tuesday - 08/13/2013, 12:24pm EDT
  • 4