Tags Posts tagged with "cybersecurity"

cybersecurity

The Board of Regents for Higher Education has voted to select Dr. Joe Bertolino as the 12th President of Southern Connecticut State University. A Board of Regents search committee recommended Dr. Bertolino among three finalists after a five-month long nationwide search.

“I want to thank everyone who participated in this process, especially the University Advisory Committee for their time and collective input,” said Larry DeNardis, Chair of the Regents Search Committee. “Dr. Bertolino greatly impressed the Committee and I am confident he will be a perfect complement to the great talent we have at Southern.”

Connecticut State Colleges and Universities President Mark E. Ojakian agreed:  “Dr. Bertolino’s commitment to students and their access to high quality higher education is very clear. He is going to be a great advocate for Southern and our system.”

”I am both honored and humbled to serve as Southern’s next president,” shared Dr. Bertolino. “While there are certainly many challenges ahead, the institution’s potential far outweighs those challenges.  I look forward to working closely with the Southern team to ensure that we continue to build strong relationships and that our institutional core rests in our mission and in service to our students.”

Dr. Bertolino is currently the President of Lyndon State College in Vermont and Special Assistant to the Chancellor for System Integration and Related Efforts at the Vermont State Colleges. He replaces Dr. Mary Papazian who resigned as of July 1. He will begin August 22, 2016, at an annual salary of $294,700.

As you can see modafinil and about modafinil can be found via this website if you are looking to learn about how modafinil works and how to buy modafinil online click here to for modafinil

Dr. Bertolino’s Curriculum Vitae can be found here: http://www.ct.edu/files/pdfs/SCSU-Joe-Bertolino.pdf

 

    Southern offers two tracks within its M.S. degree in computer science program – both of which are in high demand in today’s ever-evolving technological landscape.

    Cybersecurity (network and information security) and software development have become two areas of increasing interest within the discipline of computer science. Southern is offering those two tracks to meet the changing demands of Connecticut’s workforce.

    “Just a couple of years ago, our M.S. program was designed primarily for students who had earned a bachelor’s degree in computer science,” says Lisa Lancor, chairwoman of the Computer Science Department. “But we had been getting increased interest from individuals who had bachelor’s degrees in other disciplines and wanted to move into the computer field. We have students who majored in music, political science and other disciplines not closely related to computer science. So, we revamped the program to make it more flexible.”

    Among the changes enacted is the establishment of a single prerequisite course, instead of three such courses. The new prerequisite is a 4-credit course on computer programming and data structures. Students then take a series of core courses, as well as those in either of the two tracks. Students are then required to pass a capstone, typically a 6-credit thesis. A total of 36 credits is required.

    One of the new courses offered for those engaged in the cybersecurity track is “Ethical Hacking and Penetration Testing.” In this course, students learn how to test whether networks are secure and how to enhance that security.

    “There is a huge need for individuals who have an expertise in this area,” Lancor said. “The number of companies and organizations whose websites are hacked is growing all the time. These companies want to hire individuals who can detect and fix these security issues, but there really is a shortage of such people.”

    Lancor said that many companies actually hire individuals to try to break into their network system (without causing any damage). The idea is that if they can hack into it, the system needs to be upgraded and fixed. If it can’t be hacked, it indicates the system is probably secure, at least at that time.

    She noted that cyber-attacks are occurring more frequently these days and the hackers are becoming more sophisticated at cybercrime. “As cyber attacks become more sophisticated, demand will increase for workers with security skills,” she said.

    Lancor pointed to U.S. Department of Labor projections that indicate employment of network and computer systems administrators (which includes security specialists) is expected to show an increase of 23 percent from 2008 to 2018. Similarly, the department projects that the number of computer software engineers and computer programmers will rise by 21 percent in that same time period.

    She also said that in addition to individual hackers, foreign governments hostile to the United States are more inclined these days to try to wreak havoc with U.S. networks. In fact, The U.S. Department of Defense has increased its allocation for cyber operations in recent years. Many experts are predicting that future wars and hostilities among nations will include cyber warfare.

     

     

     

    Those of you who have read Part I and Part II of this 3-part series on cybersecurity may be tempted never to turn your computer on again.
    But take heart. While there are villains out there who seek to take control of your machine — and they may even be successful – you are not defenseless against hackers.

    Home computer users can significantly reduce the chances of being hacked by taking several steps to protect their machine.
    Home computer users can significantly reduce the chances of being hacked by taking several steps to protect their machine.

    Part III:

    Lisa Lancor, chairwoman of Southern’s Computer Science Department, says several steps can be taken to protect your machine. “Unfortunately, no single solution exists to protect your computer from all of the risks that are out there,” she says. “But securing your computer and your digital transactions should be thought about in layers.”

    Here are her suggestions:

    • Layer 1: Operating System – Regardless of the operating system you use (e.g., Windows 7, Windows 8, Mac OS X, etc.), always apply updates when you are notified. Most, if not all updates, are released to patch one or more security vulnerabilities. On your Windows machine, set the updates to happen automatically. On your Mac, when you see your App Store icon indicating that you have new updates to apply, do so immediately.
    • Layer 2: Internet Browser – It is critical that your browser stay up-to-date. “Historically, vulnerabilities in your browser have been a goldmine for hackers,” Lancor says. “Some browsers automatically check for the most recent version and if you don’t have it installed, it redirects you to update your browser before it allows you to access the Internet.” You can usually check if you are updated by going to the “About” page of your browser.
    • Layer 3: Third Party Applications and Plugins – Third party applications are stand-alone programs that work with your system, but are written by someone other than your operating system provider. Third party plugins are software widgets that add a feature to an existing software application. Adobe FlashPlayer, Adobe Reader and Oracle’s Java are examples of third party software. Always update this software, but beware of fake update messages for these and all applications and operating systems. Never click on a link to apply an update. Instead, manually navigate to the corresponding site and apply the update directly from the site.
    • Layer 4: You – This may be the most important layer of security. Many attacks are designed only to have an effect if you are duped into running malware. “As someone who studies this area, I have on several occasions almost been fooled by some very clever and targeted phishing email attacks,” Lancor says. “There was the UPS tracking message that appeared to be sent from Amazon during the holidays and then the very clever looking faux-Facebook email that enticed me into checking out some comments that ‘friends’ wrote on my wall. The friends listed were actual Facebook friends – clearly an attack that was targeted just for me.” The best way to handle these types of attacks is to never click on links in your email – simply navigate to the site manually. In the event that you need to click on the link, always hover over the link in your email and make sure the domain matches the site you are going to visit. Also, update your antivirus software. “If you don’t update your antivirus engine and signature file, your system won’t be protected from the latest known malware  that is out there,” Lancor says.

    “The key is to be smart when surfing the Internet and always think like a hacker so that you can protect yourself from having your machine taken over,” Lancor says.

    Happy and safe surfing!

    Note: Lisa was interviewed Tuesday on WTIC’s (1080 AM) “Mornings with Ray Dunaway” about some of the latest hacking incidents and what people can do to protect their computers.

    In Part I of our 3-part series, Wise Words focused on the myth that hackers have no interest in the computers of everyday individuals who do not store sensitive information on them. As you may have read, nothing could be further from the truth. Hackers can use the storage or processing power of your computer for multiple nefarious functions, even if you keep only the most innocuous of information on your machine.

    Today, we look at some other popular misconceptions.

    Part II:

    Myth: Using and updating antivirus software is enough to prevent my computer from becoming vulnerable to security incidents.

    Reality: The use of antivirus software certainly is one step you can take to help protect your system. And it is helpful against known malware (malicious software), according to Lisa Lancor, chairwoman of Southern’s Computer Science Department. (Southern recently restructured its M.S. in computer science degree to focus on cybersecurity and software development.)

    “Unfortunately, antivirus software does not protect you from malware that it does not know about,” Lancor says. “Malware that exploits a brand new vulnerability is referred to as a ‘zero-day attack’ because the security community has known about the vulnerability for zero days.”

    Nobody wants to see the dreaded virus alert pop up on their screen.
    Nobody wants to see the dreaded virus alert pop up on their screen. Keeping your antivirus software up-to-date is just one of several steps you should take to minimize the chances of your computer getting sick.

    Fair enough. But what are the chances of being hit with a “zero-day attack?”

    It’s not that rare, according to Lancor. “A recent report by McAfee Labs indicates that its researchers find and catalog close to 100,000 new samples of malware per day,” she says. “That equates to 69 new, zero-day malware samples per minute. Are you keeping up with antivirus updates every minute?”

    Even more disturbing, malware developers can sell their code on the black market of the Internet, Lancor says. They can sell for tens of thousands, even hundreds of thousands of dollars. “Clearly, creating zero-day malware is big business for hackers these days.”

    Myth: Mac users are safe from malware.

    Reality: It is true that at one time, Mac users were relatively safe from malware, though there are always exceptions. But because the number of Mac users has increased significantly during the last decade, virus writers have set their sights on Apple, according to Lancor. Just recently, a malware called IceFog was discovered that attacks both Windows and Macs and provides a backdoor into your system. “It can accept instructions from a command-and-control infrastructure to have your system do whatever hackers want,” she says.
    Lancor points to the FlashBack virus that infected more than 600,000 Macs and included them into one of the first significant Mac-based botnets. Apple has been continuously adding security features, including its own anti-malware applications, into its operating system. Mac users are advised to follow safe security practices, just like PC users.

    Myth: As long as you don’t click on ridiculous email links from people you don’t know, you should be pretty safe.

    Reality: These aren’t the spam attacks of your grandparents’ day…er, in your parents’ day…um, in your older siblings’ day. It’s not just the Nigerian banker who wants to deposit money into your banking account, or the Viagra link, or an announcement that you’ve won the lottery of a foreign country for which you never bought a ticket. “Hackers are fully aware of the security education and training that you have been receiving about not clicking on links in emails from people you don’t know or trust,” Lancor says.

    She points out that “smart phishing attacks,” also known as “spear (very targeted) phishing attacks now come from people you do know, or from hackers acting as someone you do know. “Hackers go so far as to study the content of previous email exchanges that you have had with someone and then they mimic the language and styling in an attempt to let your guard down and click on a malicious link,” she says. “The malicious link will look legitimate and quite benign.” Examples might include “annual sales report” or “a properly formed UPS tracking number. “If you click on the link, it will take you to an exploit site that is set up to blast your browser and operating system with every vulnerability that it knows about in an attempt to gain access to your machine.

    “And to make matters worse, while it used to be the case that you always needed to click on something to get infected, now there are drive-by-downloads that require you to do nothing. Just visit a website that is compromised and without you noticing, it will redirect you to a site that will fire everything it has at you (to take over your computer).”

    Coming soon:

    Part III — Protecting yourself against hackers, malware

    Caution: What you’re about to read may make you want to turn off your computer, bury it, sprinkle it with holy water and return to a pre-1990s lifestyle that was devoid of all things cyber.

    De-bunking popular misconceptions about cybersecurity can be a wake-up call for casual computer users that your machine is quite vulnerable to those with bad intentions. Spammers, phishers and those who like to spread viruses for the “sport” of it are just some of the individuals that your unit needs to be protected from in cyberspace. The recent hacking of the Target computer network – which has led to the breach of credit and debit card information for an estimated 40 million of the company’s customers and other personal data (email addresses, phone numbers, etc.) of up to 70 million others – has sparked concern and outrage from the public.

    But what kind of risk do people face with their home computers? Do hackers have any interest in your computer? The answer is yes.

    Computers at work, school and home are all vulnerable to attack from hackers.
    Computers at work, school and home are all vulnerable to attack from hackers.

    Today, Wise Words launches a 3-part series devoted to the topic of cybersecurity. Part I focuses on the myth that hackers are not interested in your personal computer because you don’t have any top secret information on it. In Part II, we will explore other common misconceptions of cybersecurity.

    But don’t worry. In Part III, Wise Words, through the insight of Lisa Lancor, chairwoman of Southern’s Computer Science Department, will offer steps that the average computer user can take to minimize their exposure to hackers. Southern recently revamped its M.S. degree program in computer science to place increased emphasis on cybersecurity and software development.

    Part I:

    Many people believe that because their machine is only for personal use, hackers have little or no interest in trying to compromise their unit. After all, we frequently hear about incidents involving hacking into computers belonging to government agencies, businesses, large institutions and political entities. Social Security numbers, credit card numbers, trade secrets, candidate strategies and classified documents can be at stake.

    But what would anyone want with a computer filled with pictures of someone’s family dog, Little League schedules and the latest standings of their Fantasy Football league?

    “Hackers value your computer for its resources, regardless of whether it has valuable information or not” says Lisa Lancor, chairwoman of Southern’s Computer Science Department.

    “In fact, they will secure your computer after they have compromised it so that no other hacker can own your machine. It’s a sad state of affairs when hackers start patching and securing your system for you.”

    What Makes Your Computer so Attractive to Hackers

    Lancor points to several purposes:

    • Storage devices – Hackers may want to store their bootlegged movies, illegal pornography and other contraband on your hard drive. “This way, you run the risk of getting caught with the illegal content and not them,” she says.
    • Processing power – Hackers may want to use your processing power for a variety of reasons. Some examples include using it to help solve computationally difficult problems, such as finding the next prime number (millions of digits long); generating Bitcoins, a decentralized, globally recognized e-currency that requires significant computer processing power; and folding proteins to help researchers understand diseases. “Solutions to computationally difficult problems can provide a big payout,” Lancor says. “And producing Bitcoins can be big business since one Bitcoin at today’s market price is currently worth about $950.”
    • Service provider – Your computer could be become an unwitting “spam machine.” The hacker may have set it up to deliver spam messages.
    • Use as part of a bot network – Bot is a shortened name for Web robot, a program that conducts repetitive functions automatically. Like many things on the Internet, a bot can be used for good or ill. Hackers sometimes take control of others’ computers to become part of a gigantic botnet composed of thousands or millions of compromised computers that are controlled by a “bot master,” or a “command and control” server located anywhere around the world. “Underground Web-based storefronts sell botnets of 1,000 U.S.-only compromised computers for the current market price of about $1,000,” Lancor says.
    • Launching pad – Hackers are usually savvy enough not to use their own computer to launch an attack. That’s what your computer can be for, just in case law enforcement traces the attack back to the launching point. “The FBI might come knocking on your door because an attack was launched against the White House or National Security Agency from your IP address,” Lancor says.
    • Free ride into your bank – Those who do some online banking or make other financial transactions via a compromised computer, watch out! Your machine can include a keylogger,  a piece of surveillance software that records every key stroke on a machine and can be used to decipher even the most secure passwords.
    • Ransom — Believe it or not, some hackers have taken to encrypting your photos and documents and holding them “hostage” with a key that only they know. They tell you to deposit Bitcoins into their anonymous e-wallet in exchange for decrypting your files.

    Scary, huh?

    Coming soon:
    Part II — Other myths about cybersecurity