Posts

Week 6: CyberSecurity Risks in Remote Work

Image
      The key cybersecurity risks Cyber Magazine highlights for remote workers: remote environments expose businesses to unsecured connections (especially public or weak home networks), phishing scams , and general cyber-awareness deficiencies ; they also struggle with device management when personal equipment is used, delayed system updates , and local sensitive data storage that may be unencrypted—all of which expand the attack surface. Additional threats include lapses in offboarding and monitoring , compliance violations , and improper cloud configurations that clash with internal security standards. To mitigate these dangers, organizations should enforce VPN usage , device control and encryption , automatic patching , access revocation , stringent cloud settings , and robust training and oversight.   Resources: https://cybermagazine.com/articles/the-top-10-risks-of-remote-working? 

Week 5: Biometrics

Image
Biometrics:                    Why Traditional Methods Fall Short Passwords and PINs are vulnerable to phishing, brute force attacks, reuse, and social engineering. The NCSC reported over 23 million accounts breached using the password “123456”             What Biometrics Bring to the Table Physiological traits : fingerprints, facial recognition, iris scans, DNA. Behavioral traits : voice patterns, typing rhythms, gait, and more. Offer greater security (unique to individuals and hard to replicate) and enhanced user convenience , eliminating the need to remember complex credentials Sectors like banking (e.g., Barclays’ finger-vein scan) and healthcare are already benefiting from reduced fraud and streamlined access Major Challenges to Address Privacy & Regulatory Compliance : Biometric data is “special category” under GDPR—requiring explicit consent, DPIAs, and strict handling ...

Week 4: Cyber Supply Chain Risk Management

Image
      Something I believe we will all will run into at some point Digital supply Chain. What is Digital supply chain? Digital supply chain protects the entire digital ecosystem involved in the movement of goods and information like raw materials leading to finished products. The aspect of supply chain security for digital systems are increasingly used to manage various aspects of the supply chain like order processing, payments and shipping. Cyber supply chain risk management is to identify what cyber risk exist within a chain and manage risks that occur since organizations no longer have control or visibility into the digital supply systems they are connected to. There are three main types of attack, Network, Software, and Hardware supply chain attacks. I won't go over all types of attack but I will talk about one that is the most common and that is Software supply chain attacks. Usually what happens is a vendor's network can be invaded by an attacker who can compromise ...

Week 3- Attackers Impersonate as Managed Devices

 A report was created that a high-severity vulnerability has been found in Cisco's Nexus Dashboard Fabric Controller which allows unauthenticated attackers to impersonate managed network devices through SSH connections that are compromised. Security researchers from REQON B.V. identified the flaw, which comes from insufficient SSH host key validation mechanisms within the NDFC infrastructure. The affected system fails to properly validate SSH host keys during connection, that allows malicious actors to conduct machine-in-the-middle attacks giving themselves the chance to position themselves between the NDFC controller and managed devices, potentially intercepting and manipulating network management traffic. Attackers that successfully exploit this vulnerability could create persistent backdoors within the managed network environment. Cisco has released software updates to address this vulnerability, with no available workarounds for affected systems. The fix implements enhances the...

Week 2- Cybersecurity Framework

     This topic felt to be related to the second lab with the process of diagnosing. Cyber Security Framework is a set of rules common to all security leaders that they must abide by. It helps companies to identify its weak spots that could lead to cyber-attacks and data breaches. Organizations have a risk management strategy but when it is combined with cybersecurity framework, it protects from every angle that cyber-attacks could appear. Ultimately the goal of cybersecurity frameworks is to protect organizations and governments from cyber risks using these components: Framework Core, Implementation Tiers and profiles. Why is cyber security frameworks important? Cyber security frameworks is important as it assist with focusing on security endeavors and assigning assets productively by zeroing in on high-influence regions and basic controls. An advantage is it can be used repeatedly while a disadvantage is it needs constant monitoring which can be expensive. In the end it...

Week 1- New Resource I found

 Something interesting I found was this cybersecurity news website that is like traditional news but shares information about threats and problems being faced in the Cyber Security field.   It covers things like: Data breaches Cybersecurity attacks all around the world Malware threats and updates   Tools and helpful cheat sheets    I found this website to be very useful as it gives us insight on what is happening in real-time and I like how it also gives us awareness on the situations going on all around the world.  https://thehackernews.com/ Another one similar to The Hacker News:   https://www.darkreading.com/