Cyber Security: Need of the hour

Read Article
Jaspreet Singh, Partner- Cyber Security, EY

By Jaspreet Singh, Partner- Cyber Security, EY

The world has witnessed a paradigm shift in the way, of how an enterprise works due to COVID-19. With more than 2.5M people getting effected due to coronavirus worldwide, and an onset of lockdowns, a lot of industries are directly impacted. Remote working is increasing as a means of practising social distancing during the COVID-19 pandemic. All the Board meetings, overall performance and other business critical discussions are also happening remotely. However, one of the most important factors to be considered is, whether these connections are secure, whether the information about their enterprise level business strategies and financial updates are safe and not getting leaked outside.

Recent Maze Ransomware cyber-attack on an IT giant has left the company disarrayed due to its compromised internal systems and impacted its IT services to some of the Company’s

Read More

How Changing Technology Affects Security

Security is a tradeoff, a balancing act between attacker and defender. Unfortunately, that balance is never static. Changes in technology affect both sides. Society uses new technologies to decrease what I call the scope of defection — what attackers can get away with — and attackers use new technologies to increase it. What’s interesting is the difference between how the two groups incorporate new technologies.

Changes in security systems can be slow. Society has to implement any new security technology as a group, which implies agreement and coordination and — in some instances — a lengthy bureaucratic procurement process. Meanwhile, an attacker can just use the new technology. For example, at the end of the horse-and-buggy era, it was easier for a bank robber to use his new motorcar as a getaway vehicle than it was for a town’s police department to decide it needed a police car, get the

Read More

CS142 Web Programming and Security

Winter 2009

The web uses complex applications that run on heterogeneous
browsers that may be built using programming technologies such as
Javascript, AJAX, Google Web Toolkit, Apache Struts, Java Server
Faces, and Rails. This course covers how core web technologies
work; common security vulnerabilities; and how to build secure web
applications that avoid them.

Prerequisities: CS107 and CS108.


Lectures: Monday, Wednesday, Friday,
11:00-11:50am, CERAS 300
Sections: Friday, 4:15-5:05pm, in 380-380Y.
Newsgroup: su.class.cs142 (for discussion with TAs
and other students)
Questions for TAs:


  Time Location
Regular Friday Mar-20-2009 08:30-11:30AM HERRIN T175
Alternate Thursday Mar-19-2009 08:30-11:30AM HERRIN T175

Note: if you need to take the alternate final and have not yet told us, contact the TAs now

The final will be open-book and open-laptop, but not open-Internet: you will need to disable your wireless receivers.

Review Session Slides



Due: Wednesday, January 14, 11:59pm


Due: Wednesday, January 21



Read More

Software Security: Building Security In.

Software Security series
Buy the box set now!

Software Security series
The Software Security series

“When it comes to software security, the devil is in the details. This book tackles the details.”

—Bruce Schneier
CTO and founder, Counterpane
Author of Beyond Fear and Secrets and Lies

Software Security: Building Security In
Buy the book!

Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice. The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugs and architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing.

Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the kinds of software artifacts you already produce as you develop software,

Read More

Computer Security Act of 1987

Computer Security Act of 1987

In 1987, the U.S. Congress, led by Rep. Jack Brooks, enacted a law reaffirming that the National Institute for Standards and Technology (NIST), a division of the Department of Commerce, was responsible for the security of unclassified, non-military government computer systems. Under the law, the role of the National Security Agency (NSA) was limited to providing technical assistance in the civilian security realm. Congress rightly felt that it was inappropriate for a military intelligence agency to have control over the dissemination of unclassified information.

The law was enacted after President Reagan issued the controversial National Security Decision Directive (NSDD) 145 in 1984. The Reagan directive gave NSA control over all government computer systems containing “sensitive but unclassified” information. This was followed by a second directive issued by National Security Advisor John Poindexter that extended NSA authority over non-government computer systems.

Since the enactment of the

Read More

Window Films, Security Mirrors, Drill Glass, Commercial Door Hardware


LK Technologies a Gordon Glass Co. Celebrates its 100 Years in Business!

LK Technologies, Inc. has been in the Glass Industry since 1920. We started as a local glass shop providing glass- and mirror-related services to the Cleveland community. Being a fabricating facility we posses the first-hand experience in all the aspects of glass and mirror manufacturing, fabricating, and installations. We don’t just sell our products; we know how they work and are always happy to share our rich experience with you.

Our primary goal is to provide you with a safe, secure environment to browse and shop for popular hardware items. If you have questions or comments that aren’t addressed below please don’t hesitate to contact us via email or call us at 1.888.663.9830.

Our ordering procedure: Within 30 minutes of placing your

Read More

Computer Security | FTC Consumer Information

Scammers, hackers and identity thieves are looking to steal your personal information – and your money. But there are steps you can take to protect yourself, like keeping your computer software up-to-date and giving out your personal information only when you have good reason.

computer backing up on an external hardrive

Update Your Software. Keep your software – including your operating system, the web browsers you use to connect to the Internet, and your apps – up to date to protect against the latest threats. Most software can update automatically, so make sure to set yours to do so.

Outdated software is easier for criminals to break into. If you think you have a virus or bad software on your computer, check out how to detect and get rid of malware.

Protect Your Personal Information. Don’t hand it out to just anyone. Your Social Security number, credit card numbers, and bank and utility account numbers can be

Read More

Biometrics Technology | Transportation Security Administration

In November 2018, TSA began testing facial recognition technology at the Hartsfield–Jackson Atlanta International Airport (ATL) in Terminal F as an alternative means to verify a passenger’s identity when they begin screening at a TSA security checkpoint. This ongoing pilot is in conjunction with U.S. Customs and Border Protection (CBP) and tests biometric technology for identity verification. The technology used is the Traveler Verification System maintained by CBP. We also tested this system in the Tom Bradley International Terminal at Los Angeles International Airport from August to October 2018.

Participation in the facial recognition test is voluntary. Passengers who choose not to have their picture taken should notify a TSA officer.

What passengers can expect

Facial Recognition Technology at Los Angeles International AirportWhen passengers present their boarding passes, a TSA officer will ask if they would like to have their picture taken instead of providing physical identification documents. CBP’s system will attempt to compare that picture to

Read More

Kevin Mitnick & The Global Ghost Team Security Consulting

“We would need to give out FREE PUPPIES this year to match the record crowds and excitement that Kevin Mitnick generated at our tradeshow booth last year, so, we just booked him again!” -VMWare

“Kevin’s talk was a huge hit. He was charming, funny and definitely in the zone. The talk covered his early childhood pranks, illuminating how he developed the hacker instinct that ultimately got him into trouble.” – Microsoft

“In two weeks, $4 billion worth of our data and intellectual property was sitting in front of me on an external drive! My own team told me nothing was missing, the same team that had said hacking us would be impossible.” -CEO, Fortune 500 Software Company

“Delegates at the event gave Kevin a rating of 98% for content and 98% for delivery. I’m sure you will agree with me the scores were sensational.”

“Kevin has a unique ability to

Read More

Comodo Internet Security | Best Internet Security Suite for Windows

Overview of Internet Security Software

What brings the real need of Internet Security Suite for PC Protection?

Internet Security Suite is a multi layered protective mechanism that refrains hackers from creeping into any of the user’s personal or business related data.

Comodo stands promising with its Internet Security suite probing a 360 level of protection with a sturdy antivirus, and an enterprise class packet filtering firewall amongst its contemporaries assimilating unique and cutting edge techniques like sandboxing of unknown files or zero day threats, advanced host intrusion prevention.

Conventional PC protection software has reduced to essentials and is now been outsmarted by the next generation Internet Security Software from Comodo, which can be downloaded for $17.99 and the users can access the benefits with the complete version of the products and helps the users to stay away from audacious hackers.

Comodo Internet Security offers complete protection from viruses, Trojans, worms,

Read More