Cyber quiz review 1

Importance of Timely Preparation

  • Halfway through the semester, emphasis on buckling down and attending to assignments and studies.

  • Encourage students to clarify any questions regarding course materials.

Upcoming Assignment Details

  • Assignment due on "Cybersecurity" scheduled for 07:00 at Science Center 101.

Current Events in Cybersecurity

Data Leak Incident

  • Recent news: 1,600,000 records leaked from clinical trial database.

  • Company involved: Clinical Research, based in Houston.

  • Discovery by Jeremiah Fowler from Security Discovery, specializing in monitoring online activities.

  • Issues highlighted:

    • Lack of password protection and encryption allowed public access to sensitive data.

    • Examples of leaked data: personal identifying information, PDFs with sensitive details (DOB, emails, phone numbers, vaccination records).

  • Unclear if exposure was due to malicious intent or oversight.

  • Potential legal ramifications due to violations of HIPAA regulations.

Importance of Cybersecurity Education

  • Cybersecurity not only about preventing attacks but ensuring proper information management.

  • Encouragement for individuals and organizations to be proactive in protecting sensitive data.

政治和网络安全(Cybersecurity Politics)

Analysis of a Recent Risk Assessment

  • Interview with Stephanie Cross on the Cybersecurity landscape.

  • Focus on Russian cybersecurity company, Kaspersky Labs.

  • Updates to include noncorporate Commonwealth entities to national cybersecurity requirements.

  • Highlighted US restrictions on Kaspersky products since 2017 and potential political implications.

Collaboration for Enhanced Cybersecurity

Verizon Business and Halot Partnership

  • Halot collaborates with Verizon to enhance mobile device security.

  • Goals include protection against various cyber threats, including malware and phishing scams.

  • Integration of cybersecurity updates directly into the Verizon network, reducing user effort.

  • Targeted aid for small to medium-sized businesses, ensuring widespread protection.

Case Study on Cryptocurrency and Cyber Theft

North Korea Cyber Operations

  • Incident involving a theft of $1,500,000 from a Dubai-based virtual exchange linked to North Korean actors.

  • Funds reportedly converted to cryptocurrency, highlighting challenges in tracking cybercrime activities.

  • Issues raised about the prevention and traceability of cryptocurrency crimes.

Clarification of Data Breach vs. Data Exposure

  • Key distinctions:

    • Data breach: unauthorized access to data due to security vulnerabilities.

    • Data exposure: readily accessible information due to lack of protective measures.

  • Examples of data exposure incidents: Kentucky state schools exposing Social Security numbers due to mismanagement.

Quiz Information

Quiz Format and Importance

  • Quiz due in one week: total of 13 questions, worth 15 points.

  • All answers must be original and in students' own words to avoid academic dishonesty issues.

  • Detailed topics for each question:

    • CIA triad and related attacks.

    • Cryptography principles.

    • Principle of least privilege.

    • Risk management steps discussed in class.

    • Risk-based approach to security.

    • Social engineering threats.

    • Incident response and disaster recovery.

    • Basics of firewalls.

    • Defense in-depth strategies.

    • Issues surrounding social media misinformation.

    • Reference to a film discussed in class.

  • Quiz available for several days, feedback on timing and efforts visible for instructors.

robot