Description: Preventing terrorist plots is harder than ever, and technology is both the problem and the solution. Source: CNN Money Date: November 24, 2015 Violent extremists like ISIS meet in the open on Facebook or Twitter. Then they take the conversation private, using technology called encryption to encode their messages. It’s called “going dark”, and it’s one… Read more »
Posts Categorized: cyber terroism
Description: Ghost Security Group, also known as GhostSec, is small hacker army composed of ex-military and ex-Anonymous members fighting ISIS online. Source: CNN Money Date: November 20, 2015 Ghost Security Group is a counter terrorism network that combats extremism on the digital front lines of today using the internet and social media as a weapon. Questions for… Read more »
Description: Some websites running SSL encryption, such as Airbnb, Pinterest, USMagazine.com, NASA, and Creative Commons, among others, were exposed to a major security bug called Heartbleed on Monday. Source: Mashable Date: April 9, 2014 The bug affects web servers running Apache and Nginx software, and it has the potential to expose private information users enter into websites, applications,… Read more »
Description: CNN’s Rene March reports on why there is a shortage of cyber security experts Source: CNN .com Date: April 24, 2012 Questions for discussion: 1. Why is cyber security such a great area in which new grads can find jobs?
Description: Computer hacking has always been a pursuit driven more by geeky passion than a quest for profits. But it is now becoming a pathway to earning serious money. Source: globeandmail.com Date: Oct 10, 2011 A decade ago, a skilled hacker who discovered a software security flaw had two choices: he could tell the company… Read more »
Description: CNN’s Dan Simon pays a visit to a U.S. government lab that protects the nation from cyber-terrorism. Source: CNN .com. Date: Oct 1, 2011 Questions for discussion: What do you feel are the major risks from cyber terrorism in your geographic area? How should Canada best prepare for cyber war attacks?
Source: Ted.com. Date: July, 2011 Questions for discussion: Is this technical threat a manageable risk for the modern organization? How would one manage theses risks 2. Should this threat be managed by governments or by the private sector? Why?
Description: Source: British Prime Minister David Cameron suggested that the government should impose limits on the “free flow of information” when it’s “used for ill.” “When people are using social media for violence, we need to stop them,” he said then. Source: CNN.com Date: Sept 8, 2011 “Instead of detailing plans to block criminals’ access to… Read more »
Description: An older type of social network, and it’s being used to help detect fraud. It is the connections between people in the physical world. Source: Globe&Mail.com Date: March 8, 2011 Banks, telecoms providers and insurance companies, among other businesses, are using analytic software to correlate all of their various data sources to produce visualizations of relationships… Read more »
Description: A website claims to give “administrator” access to various web addresses for a price, causing serious security threats Source: CNN.com Date: Jan 28, 2011 Questions for discussion: Do you thinks this type of be behavior is legal or ethical? What should be done to shut this down? Do you feel the security in these hacked sites… Read more »