How Can We Help Users Improve Security?
Maybe we should rename CIA. I don’t mean the government agency by that name. I’m risking heresy by saying that the tired old acronym CIA for Confidentiality, Integrity, and Availability isn’t sacred text. We talk about CIA in Learning Tree’s System and Network Security Introduction course. Let’s take a critical look at it here. I’ve […]
The Next Big Thing in Biometric Authentication: Ephemeral Biometrics
A device like a FitBit may soon greatly improve user authentication. The key to this will be ephemeral biometrics. We talk about biometric authentication in some of Learning Tree’s cyber security courses, including the System and Network Security Introduction course and the CompTIA Security+ test-prep course. But how are ephemeral biometrics different? Biometrics Today Biometric authentication […]
What do Clocks, Cars, and Warships have in Common?
A few months ago we had Daylight Savings Time. My parents were delighted to discover that “the clock” in their car automatically adjusted itself, as did their computer. But now they had to change the two clocks in their bedroom, the two clocks in the kitchen, and several others around the house. How did the […]
Distinguishing and Combating DDoS Attacks
Cyber Attacker, Brian Krebs, wrote an article criticizing criminals who use DDoS (or Distributed Denial of Service) for extortion. They flood your servers with traffic. This makes them inaccessible to your intended audience. After a few hours of attack you receive a message explaining how you can pay to make it stop. Soon after his […]
Patch Your Samba Servers or Risk a Worse Version of WannaCry
The big cybersecurity news of the past couple of weeks has been the WannaCry worm. It took advantage of some rather old bugs, dating back to Windows XP and Windows Server 2003. We got lucky! The vulnerability, the problems in the targets, allowed unlimited abuse. But the exploit, the attackers’ code, had a built-in “kill […]