Friday, May 8, 2009

Journal Article 3

This article refers to a TV investigation that uncovered a black market in Nigeria for Blackberries. The price of the phone was reflected upon how much information was stored in the phone, not the age or model of the phone. I chose this article because it showed a real life example outside of actual hard drives that confidential information is being leaked through other storage devices - enough for there to be a market and a TV investigation/report.

Though the phone came with technology to remotely wipe devices and come with built-in encryption, most customers found this a nuisance. I believe there has to be some sort of warning or documentation included in the user manual for the importance of sanitizing these storage media.

Trade in secondhand BlackBerries booming in Nigeria

Tuesday, April 21, 2009

Journal Article 1

I chose this article because it specified actual routines recommended from NIST 800-61. NATO's operational lead for cyber-defense explained of a situation where pro-Russian hackers launched a massive attack against Estonian state and bank computers. Immediately, the Estonian bank contacted and cooperated with the authorities and their Internet service provider. The article states the level of cooperation with all entities solved the issue.

http://www.thaindian.com/newsportal/world-news/nato-online-worms-wars-and-ethical-hackers_10051343.html

Journal Article 2

This article is related to network security monitoring. Zecurion created an e-mail system for any business to use to have more control over e-mails being sent. This is a great start for business monitor their employee e-mails for confidential material being sent, employees replying to spam e-mail, etc.

This type of minor service can save a company from being severly damaged from a simple e-mail. For example, an article I read about an employee replying to an spam e-mail containing the contents of the company's web hosting services. Soon after, the culprits forwarded all users visiting the website to another website.

This service deals with incident response in a way that the process includes detecting and analyzing incidents.

http://www.net-security.org/secworld.php?id=7352