Thank God, I am almost half way through my final semester! It's been very challenging. I have to admit I am not good at designing network diagram. Hopefully, I get better since this was my first time designing a network diagram. Reading other students assignments and network diagram helping me to understand better. As usual, discussion board has been my source of learning and understand the different views of students. Some of the assignments from by Security Architecture class are tough. I wish professor would provide us additional information about the topic. We had some assignments where I couldn’t find much information on the Internet or textbook. Well, this is a part of learning. Sometimes you have to go deeper and work hard to find resources. Cyber Security field not meant to be so easy. Also, I read other students question on the professor's online board, and makes me feel ok that I am not doing that bad. We all are on the same page except those smartest ones. I think milestone types of assignments are difficult because if you mess up the first assignment, most likely there is a good chance you won't do good on the next milestone since you didn't build the base well. Applying students and professor's suggestion has been helping me to improve. This is good enough about my experience in week 6. So let's roll back to our usual blog writing style.
Article 1:
I read some news this week. They are talking about the United States might be behind the North
Korea's missile test failure. This may or may not be true, but if it is true, it would be good news for the United States, but the future, it may not be good unless we continue to develop new ways of fighting in the cyber domain. I liked how the news was written on this website (http://www.maxim.com/news/us-hacking-north-korea-missiles-2017-4). If this is true, I hope they always keep this secret as no-one needs to know how they did. Imagine if countries like Iran or North Korea could do the same to the other countries. No matter how sophisticated tool you build, if the hackers can somehow penetrate, your tool is useless since you can't operate how you want. For North Korea, this was an embarrassing moment especially when they were celebrating the 105th birthday of Founder Kim Sung.
Article 2:
It's unusual and surprising what hackers are capable of
doing. In a way, they are the troubleshooters for the good guys. If we didn’t
have black hat hackers, I think the newer technology development would be much
slower. There are the ones who make IT companies think twice before the design
anything or release new products. Whenever a company releases a new tool and
claims to be the most secure, hackers eventually hack the tool. This is the
fate of the current technology. It's easier to break then build but what
hackers are doing is very smart even though they do for various negative
reasons. I am trying to refer to this news I read this week which is titled as
"Stealing your PIN by tracking the motion of your phone." How is this
even possible?
This article says, "Cyber experts have revealed the
ease with which malicious websites, as well as installed apps, can spy on us
using just the information from the motion sensors in our mobile phones.
Analyzing the movement of the device as we type in information, they have shown
it is possible to crack four-digit PINs with a 70 percent accuracy on the first
guess — 100 percent by the fifth guess — using just the data collected via the
phone’s numerous internal sensors.".
Wow, this tells us why we shouldn’t download apps that we
see on the app's store. Malicious apps can spy users from the motion sensors
which are used in our mobile phones. Even though the study has shown only 70
percent accuracy on the first guess of the PIN used in a mobile, the fifth try
got 100 percent score. Most cell phone users are unware of this and continue to
use the mobile as usual. It sounds like a serious threat, but this article
didn’t give any ideas to prevent from happening. But I think it is always a
smart not to click or download any unknown apps. Reading the apps reviews gives
a good idea where the apps are good or bad. Some of the smart phones allow having
6 to 8 digit pins or using biometric to log into the cell phones.
http://www.homelandsecuritynewswire.com/dr20170412-stealing-your-pin-by-tracking-the-motion-of-your-phone


No comments:
Post a Comment