Article Query: Cyber Security
October 6, 2011

As we read and discuss the subject of computer hacking and related nefarious uses of the Internet, we focus for the most part on the Information Technology and Information Security side of the topic.  There is another side, however, one dealing with the moral and ethical aspects of hacking, approached from a religious viewpoint to [...]

September 23, 2011

We are just a week away from the month of October, and October is National Cyber Security Awareness Month (NCSAM).  The goal of National Cyber Security Awareness Month, conducted every October since 2004 and sponsored by the National Cyber Security Alliance (NCSA), is to improve cyber security posture and preparedness, and to encourage everyone to [...]

September 9, 2011

United States House of Representatives members are readying a series of cybersecurity bills that are designed to enhance security on several fronts, including toughening law enforcement, assigning responsibility to the Department of Homeland Security (DHS) for federal IT and critical infrastructure security, and to lessen legal liability for private organizations that adhere to security best [...]

September 5, 2011

It is no secret that cyber attacks are growing in complexity and severity.  In August of this year, a malware-powered cyber-reconnaissance attack, dubbed Operation Shady RAT, was reported by McAfee.  The cyber attack had been ongoing since 2006, and claimed victims across a wide spectrum of Internet connected organizations, including government agencies in the United [...]

August 26, 2011

There has been a lot of discussion lately concerning Internet security and privacy, spurred on by what seems like an almost daily occurrence of web site hacking and the loss of confidential data.  Medical facilities, private industry, and governments alike struggle to come to grips with new methods of cyber crime and cyber terrorism.  While [...]

August 23, 2011

A relatively new hacker web site has cropped up, but this time it’s less about hacking and more about competition… sort of.  RankMyHack.com is a web site where hackers can compete amongst one another for ranking as the top hacker.  This is accomplished by earning points for the number and size of the success hacks [...]

August 15, 2011

As hacking groups such as Anonymous and LulzSec continue to make headlines, many of us in the Information Security field can only sit back and shake our heads.  The large number of successful system breaches, web site defacements, and the publication of confidential data is not at all surprising, and for the most part was [...]

July 26, 2011

The term security posture is used in information security to describe the overall security effectiveness of a given system, service, or network.  All aspects of security strength and weakness are evaluated and weighed against both potential and known threats in an effort to gauge the current level of protection.  This same process can be used [...]

July 6, 2011

A fledgling international cyber security alliance is continuing to gather backing from private business, according to a recent article published on ComputerWeekly.com.  The International Cyber Security Protection Alliance (ICSPA) aims to support law enforcement agencies in countries that lack the resources to fight cybercrime.  Commercial security organizations such as McAfee and Trend Micro are supporting [...]

July 6, 2011

The announcement this week that a team of hackers have began to target the members of another hacking group has put an interesting spin on recently publicized cyber attacks against several organizations.  A group calling themselves the “A-Team” have targeted the members of LulzSec—a group claiming responsibility for many of the latest successful security beaches–in [...]