liamgh21-blog
liamgh21-blog
How is Cybersecurity evolving in the face of constant threats?
20 posts
Hey everyone! My name is Liam and I am a junior Old Dominion University majoring in Marketing. I am taking COMM372T to better enhance my utilization of today's internet age and social media. I hope to bring further knowledge as to what advancements are continually being created to protect the online users as constant threats of cyber attacks happen. I hope you enjoy!
Don't wanna be here? Send us removal request.
liamgh21-blog · 8 years ago
Text
Hope Everyone Enjoyed the Curation!!!
I hope you all enjoyed my curation project and what I had to offer! Here are a couple of reference I used during my curation:
https://www.cnbc.com/2017/08/04/cloud-computing-cybersecurity-defend-against-ransomware-hacks.html
https://www.cyberark.com/blog/new-york-state-gets-bullish-cyber-security-programs/
https://healthitsecurity.com/news/preparing-for-the-2017-healthcare-cybersecurity-threats
https://www.nytimes.com/2017/10/11/technology/personaltech/cybercriminals-spies.html?rref=collection%2Ftimestopic%2FComputer%20Security%20(Cybersecurity)&action=click&contentCollection=timestopics®ion=stream&module=stream_unit&version=latest&contentPlacement=5&pgtype=collection
https://thehackernews.com/2017/10/android-bug-bounty.html
https://www.csoonline.com/article/3233951/machine-learning/how-ai-can-help-you-stay-ahead-of-cybersecurity-threats.html
https://blogs.cisco.com/security/staying-ahead-of-the-hack-operationalizing-threat-intelligence-to-strengthen-defenses
1 note · View note
liamgh21-blog · 8 years ago
Link
clouding computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. A lot of companies are now saying cloud computing is a safer way of keeping sensitive information stashed away from hackers. The main reason why  cloud computing is a safer path to take is because cloud computing companies are putting in more security into the cloud more than anything. Many are offering consumers easy-to-use options to lock down their data.  For instance Amazon is a highly secured cloud company. In the article, it says, “If you sign a contract with Amazon, for instance, I would say you've signed a contract with a highly secured firm. This could be an incentive to invest more in the cloud, or transferring more company information systems to the cloud.” This being said, Cloud computing can be something major to small and large companies wanting to secure their online infrastructure. Investing in the cloud and in cloud companies can be the next step to a highly secured online life style. 
0 notes
liamgh21-blog · 8 years ago
Link
As you may know, New York is the investing capital. With all the financial service providers, banks, and insurers, cyber attacks are bound to happen with out anyone even knowing. Effective as of March 1, 2017, The New York State Department of Financial Services proposed 23 NYCRR 500, which is a regulation requiring banks, insurers and other financial service providers to improve their organizational cyber-readiness through the establishment of programs and policies that protect sensitive electronic data. What this article puts into detail is how each Financial service is forced to have some sort of cyber security protection, policy, or regulation, preventing any intent on hacking them from happening. I see this as something major due to the fact that it should be required to protect your business and even yourself from cyber attacks. This regulation not only protects businesses from hackers but also implements future policies to stay in place, giving it a long term stance. 
0 notes
liamgh21-blog · 8 years ago
Link
When you think of the medical field, you don't generally think of cyber attacks or even cyber security. With hackers becoming more advance, they tend to go after any sensitive information they can get their hands on. Such information as patient information and health insurance data. In this article, it specifies what steps the medical industry is taking to prevent such attacks from happening. One example of caution that caught my attention in the article is simply having good cyber hygiene. Cyber hygiene is the establishment and the maintenance of an individuals online safety. Majority of the time, new technology will not keep an online user safe from hackers. The newer the technology gets, the more the hackers have a way to access sensitive information. It takes an individual to have a conscious when going online. For medical facilities and personal, it will take the initiative of each individual who is in the medical field to have their systems tested and checked regularly before an attack happens, such as having data base monitoring so that hackers cannot access the data base of medical facilities. Medical facilities are also looking into implementing the use of artificial intelligence so that hiring cyber specialist will not be so costly as having a automated cyber defense system. 
0 notes
liamgh21-blog · 8 years ago
Link
As you may know by now, anything digital with a network can be potential vulnerable to hackers. I recently came across this article where it talks about how a cyber security reporter for the New York Times takes prevention against cyber security threats and potential cyber security attacks. What I like most about this article is how it is a one on one interview with Nicole Perlroth, the Cyber Security reporter for the New York Times. She goes over what steps she takes to be cautious online such as using 2 computers; one for surfing the web and another one for banking information and other sensitive information. She continues to talk about other preventions she takes such as covering here web camera when ever she is online. Hackers are known for looking through individuals web cameras to access their face template. In today’s age, we have facial recognitions that can unlock our phones and computers. With this type of information, hackers are able to use our facial recognition to access anything that will allow facial recognition passwords. This is definitely a scary thought but with utilizing the precautions that Nicole Perlroth uses, many people can prevent the daily hackers goal.
0 notes
liamgh21-blog · 8 years ago
Link
Cyber security attacks can happen on any device that has a network, especially on cell phones. Google has recently introduced a bug bounty program for android apps on the google play store. A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities. This gives White-hat hackers more opportunities to track new malicious attackers. White-hat hackers are computer specialist who break into protected systems and networks to test and asses their security. Having white-hat hackers asses and test the google play store will be a great advantage that will let users of the app and other apps to feel secure on their android phones daily. 
0 notes
liamgh21-blog · 8 years ago
Link
Cyber security is becoming more advanced now than ever. With the high threat of cyber attacks and the high employment rate of cyber specialist, cyber security companies are now looking for new innovative ways to automatically defend a company from cyber attacks.This article will talk about how  the newest innovation that will change the cyber security field is the Use of Artificial Intelligence (AI) and Machine learning. AI is any device that perceives its environment and takes actions that maximizes its chance of some success at some goal; pretty much a robot. Machine learning is software that can learn on its own based on human input and the results of its actions. These two new innovations work together to monitor cyber attacks all around the clock. For a lot of companies, the use of AI and machine learning will greatly benefit their spending due to companies spending less on cyber specialist.
0 notes
liamgh21-blog · 8 years ago
Link
As you may know, Apple is the leading technological company in today’s generation. With all of their products being able to connect over a network, they would definitely need some sort of cyber protection to protect their customers from any malicious cyber attack. Recently, Apple has released security updates to its customers to protect them from hackers trying to steal information from using wifi traffic. I believe this is a big step in cyber security due to the vulnerability of accessible wifi. Wifi is something that is available to everyone, and therefore, can cause a great risk to sensitive information. 
0 notes
liamgh21-blog · 8 years ago
Link
In today’s generation, every technological device from refrigerators to intelligent indoor lighting is connected to a network in some way. Cyber specialist call this the IoT, or the internet of things. The IoT is a network of internet-connected objects able to collect and exchange data using embedded sensors. Recently, the government has put out a bill called “ The Internet of Things Act of 2017″. This legislation establishes realistic standards with respect to security in connected devices sold to the federal government. This helps secure any device before it is actually in government hands. 
0 notes
liamgh21-blog · 8 years ago
Link
The number one goal in cyber security is staying ahead of hackers and never falling too far behind the line. in today’s society, there are more and more cyber security training centers and schools ready to educate future cyber security professionals. What I like most about this article is how it gave a cyber security teacher’s point of view and how the teacher teaches his students. In the article, the cyber security teacher expresses how he teaches his students to hack into computers. When he wants his students to hack into a computer, he not only wants the information that was hacked, but how his students retrieved the information. This pushes cyber security students to a further level of thought when it comes to cyber attacks. What we really want to know is how the hacker gets into the system, not just what information was taken.
0 notes
liamgh21-blog · 8 years ago
Link
In my own opinion, I believe that in order to really prevent future cyber attacks, you have to get into the minds of the hackers themselves. If a cyber analyst can think like a cyber terrorist, then an attack can be prevented long beforehand. in the article, it says “ cyber security professionals are constantly looking for ways to develop better and more secure software programs, hackers are always staying on top of the newest updates to overcome the latest defenses.” If a hacker can constantly stay up to date, then so can the cyber analyst. When cyber security professionals can better understand the mysterious nature of hackers and how they work, they may be able to better protect their own systems. 
0 notes
liamgh21-blog · 8 years ago
Link
Rackspace is the #1 managed cloud company that helps businesses tap the power of cloud computing without the complexity and cost of managing it all on their own. They just launched a new Privacy and Data Protection (PDP) that offers help to recognize and defend in a customer’s environment such as intellectual property, customer payment information, and personally identifiable information. When I shop online, I usually think of where my information goes. one question that comes to mind is “What protection does this company have that will protect my information from potential threats?” A business should be required to have protection towards customer information. What consumers don not think of is whether the business they buy from has cyber threat protection or not. Usually, cyber threat protection should be equipped on a company’s website, but most are not. What Businesses should be more aware of is how to take action before allowing customers onto their site. 
0 notes
liamgh21-blog · 8 years ago
Link
Like the article says, the security methods of the past are long behind us. what happens now is up to the leading technology that is developed in today’s society. The threats that we face today are more sophisticated than ever and now we face the requirement to improve the security. What this article talks about is how cyber analysts use cyber hunting to track down cyber threats before they even happen. It uses human analysis of all activity within your tech footprint. Cyber hunting is basically an investigation of cyber threats, and the cyber analysts are the detectives. With the help of cyber analysts using cyber hunting, it reduces the risk of the hacker attacking your business. Cyber security needs more than new and improved technology, it needs human intelligence as well. 
0 notes
liamgh21-blog · 8 years ago
Link
Cyber security will continue to evolve throughout our lifetime, and as it grows, so will the minds of the cyber security specialist that protect our online life. What this article discusses is how cyber security training should consist of labs to practice cyber defense; not just giving cyber security students test that are static or having them read an uninspired and outdated textbook.  What cyber security teachers and professors wan to achieve is to have a real-life training program that allows students to be hands on with live systems that generate modern cyber-attack scenarios. With the advancement of cyber security training, this can potentially put a halt on cyber-attacks as cyber threats grow. Having real life scenarios played out in labs for students to practice their cyber defense is such a great strategy that makes online cyber security multiple steps ahead of the modern-day hackers. 
0 notes
liamgh21-blog · 8 years ago
Link
What most people do not know is that cyber security is a growing threat in todays society; but luckily we have people out there in the world preventing these threats from happening too often. What this article talks about is how there are 10 ways cyber security will evolve in the face of growing threats. One essential way cyber security will evolve will be through convergence. Convergence is a major part in cyber security due to the emergence of new technologies and converging those technologies to make better and faster cyber security. In the article, Sándor Bálint, security lead for applied data science at Balabit, said that convergence of technologies will mean better integration possibilities between vendors of different products, inclusion of advanced analytics into various security products, security getting a more prominent place in non-security products and a renewed interest in data integration and analytics products specially tailored to cater for the needs of information security.  Not only the convergence of technologies will benefit cyber security but also the convergence of skills. Combining skills from law, education, economics, IT, and data science will be a great advantage for cyber security to emerge above cyber threats for the years to come. 
1 note · View note
liamgh21-blog · 8 years ago
Link
New York is the #1 target for cyber threats. In this article, it talks about how New York is implementing strategies to take in order to minimize these threats and eventually try to put them to an end. One Policy that was put into place to minimize cyber threats was the Digital Media Reuse Disposal Policy. This policy protected any information from unauthorized access by having digital media undergo a data sanitization process before being disposed of. What many people do not know is that once you delete personal info off of the world wide web, it is still available to those who search for it deep enough. I think this policy is a great way of keeping hackers and cyber threats from obtaining any personalized information that does not need to be seen. New York has also created a similar policy to the Digital Media Reuse Disposal policy for agencies in NYC called the Intro. 626 Bill. 
1 note · View note
liamgh21-blog · 8 years ago
Link
I thought that this article would be great due to it explaining how exactly cyber security companies are strategically planing on creating new ways to take down cyber threats. Cyber security companies such as AT&T, IBM, Nokia, Palo Alto Networks, Symantec, and Trustonic are coming together to assist with today’s top internet of things (IoT) security challenges. IoT is anything natural or man made object that can be assigned an IP address and provided with the ability to transfer  data over a network. A couple examples of IoT are a Heart monitor and a automobile that has a built-in sensor to alert the driver when tire pressure is low. The cyber security alliance to tackle the IoT security challenges are trying to influence security standards and policies. I believe it starts with the user; when cyber threats are prevalent, the user should be aware and take precautionary actions before an attack even happens. The IoT cyber security alliance wants to advise customers and educate the industry on the cyber security measures needed to create a safer IoT ecosystems. The IoT cyber security alliance is currently trying to solve IoT security problems at every layer of security; cloud, the endpoint, connectivity, and data/application layers. The Alliance includes experts at every layer to helps organizations and companies be more aware. The combined forces between the IoT cyber security alliance are helping businesses continue to grow in an ever changing market.
0 notes