Posts

Showing posts from June, 2025

Week 6: CyberSecurity Risks in Remote Work

Image
      The key cybersecurity risks Cyber Magazine highlights for remote workers: remote environments expose businesses to unsecured connections (especially public or weak home networks), phishing scams , and general cyber-awareness deficiencies ; they also struggle with device management when personal equipment is used, delayed system updates , and local sensitive data storage that may be unencrypted—all of which expand the attack surface. Additional threats include lapses in offboarding and monitoring , compliance violations , and improper cloud configurations that clash with internal security standards. To mitigate these dangers, organizations should enforce VPN usage , device control and encryption , automatic patching , access revocation , stringent cloud settings , and robust training and oversight.   Resources: https://cybermagazine.com/articles/the-top-10-risks-of-remote-working? 

Week 5: Biometrics

Image
Biometrics:                    Why Traditional Methods Fall Short Passwords and PINs are vulnerable to phishing, brute force attacks, reuse, and social engineering. The NCSC reported over 23 million accounts breached using the password “123456”             What Biometrics Bring to the Table Physiological traits : fingerprints, facial recognition, iris scans, DNA. Behavioral traits : voice patterns, typing rhythms, gait, and more. Offer greater security (unique to individuals and hard to replicate) and enhanced user convenience , eliminating the need to remember complex credentials Sectors like banking (e.g., Barclays’ finger-vein scan) and healthcare are already benefiting from reduced fraud and streamlined access Major Challenges to Address Privacy & Regulatory Compliance : Biometric data is “special category” under GDPR—requiring explicit consent, DPIAs, and strict handling ...

Week 4: Cyber Supply Chain Risk Management

Image
      Something I believe we will all will run into at some point Digital supply Chain. What is Digital supply chain? Digital supply chain protects the entire digital ecosystem involved in the movement of goods and information like raw materials leading to finished products. The aspect of supply chain security for digital systems are increasingly used to manage various aspects of the supply chain like order processing, payments and shipping. Cyber supply chain risk management is to identify what cyber risk exist within a chain and manage risks that occur since organizations no longer have control or visibility into the digital supply systems they are connected to. There are three main types of attack, Network, Software, and Hardware supply chain attacks. I won't go over all types of attack but I will talk about one that is the most common and that is Software supply chain attacks. Usually what happens is a vendor's network can be invaded by an attacker who can compromise ...

Week 3- Attackers Impersonate as Managed Devices

 A report was created that a high-severity vulnerability has been found in Cisco's Nexus Dashboard Fabric Controller which allows unauthenticated attackers to impersonate managed network devices through SSH connections that are compromised. Security researchers from REQON B.V. identified the flaw, which comes from insufficient SSH host key validation mechanisms within the NDFC infrastructure. The affected system fails to properly validate SSH host keys during connection, that allows malicious actors to conduct machine-in-the-middle attacks giving themselves the chance to position themselves between the NDFC controller and managed devices, potentially intercepting and manipulating network management traffic. Attackers that successfully exploit this vulnerability could create persistent backdoors within the managed network environment. Cisco has released software updates to address this vulnerability, with no available workarounds for affected systems. The fix implements enhances the...