October 2022

WK8 Cybersecurity

find one concrete example of "bad behavior" in the online space. briefly summarize what happened... Who was involved, and what was the outcome? Was there financial loss or damage to someone's reputation? Were the criminals held accountable? What practical lessons can we learn as a result of this example (i.e., what will you do to avoid being similarly victimized?)

 

Bad behavior is a painfully common response in the digital world; from hackers who take people’s private information and steal, to “doxxers” who spend their time religiously stalking people and reveal information publicly about them. People who act motivationally on bad behavior are often targeting subjects as a joke, but there are those who behave with the intent of damaging other’s reputation or causing harm to the individuals.

This malicious activity online is no foreign concept, as news outlets, Twitter fans, Twitch streamers, famous idles, and more have been victim to false pretenses and nonconsensual information reveals.

A dangerous tactic known as “swatting” is unfortunately one of many bad behaviors from internet trolls. Thriving to ruin people’s lives and wreak havoc, people who “SWAT” are best-known for finding live locations to report fake, extreme illegal activity like hostage situations, drug busts, and terrorism. Adrian Diaz, the local chief of Seattle PD, warns on the station’s blog, “Anyone can be the target of swatting, but victims are typically associated with the tech industry, video game industry, and/or the online broadcasting community. We have also seen cases where criminals are attempting to silence people with elevated online profiles, elevating these particular swatting incidents to hate crimes.”  The people who are swatted will be raided by police and, of course, held at gun point and arrested.

One victim of a particularly bad case of swatting was Joshua Peters, known online as the streamer KoppaTroopa who live streams videos of games on Twitch. During one of KoppaTroopa’s live streams that are reported to have over 60,000 viewers present in 2015, he and his family was swatted by the police with an anonymous call. With no warning in the confusion, it was KoppaTroopa’s 10-year-old brother who opened the door for the officers –

only to be immediately greeted by approximately 10 officer’s guns faced at him. (Matthew Wilson, 2015)

 

In a reposted clip of the streamer’s reaction after everything was cleared up on Youtube, KoppaTroopa states shakily, “I had police point a gun at my little brothers because of you. They could have been shot, they could have died because you chose to SWAT my stream.” Fans, family, and everyone involved were enraged by the heinous act, but it is unknown whether the aggressor was arrested or caught. KoppaTroopa and his family was physically left unharmed, but it is almost certain that the trauma and emotional damage will stick with them for years to come.

Online safety is vital, especially for those who are consistently posting on the internet and performing live streams. The best way to stay safe and prevent similar incidents is to ensure that you practice cautious information sharing and refrain from giving out your personal information online, no matter how brief or minor.

 

https://www.looper.com/746388/streamers-who-were-swatted-live-on-stream/

https://www.seattle.gov/police/need-help/swatting

https://www.kitguru.net/channel/generaltech/matthew-wilson/twitch-streamer-swatted-in-front-of-60000-viewers/

https://www.polygon.com/2015/2/9/8004183/swatting-victim-to-harassers-ten-cops-pointed-guns-at-my-little

WK7 MIDTERM

Know your enemy: As of Summer 2022, what are 5 sources/types of potential digital threats to your organization. Examples include external malicious actors or internal human error. Provide a thorough description and examples; be specific. 

For years of late, security breach from hostiles have threatened countless web pages extensively. Keeping in mind the nature of these threats, it’s important to recognize who and what is a danger to your particular website and how you can prevent them from trespassing.

Among these cyber threats, the most probable are as follows;

email and spam

Email and spam attacks aren’t unusual to the average citizen, sent out by attackers in bulk to randomized people in an attempt to phish them into giving out information, downloading a virus, or giving them money. The attackers disguise themselves by falsely advertising for free anti-virus malware, services like doctor’s offices or your bank, links, and demands for compensation on a fake payment through your email. Once you receive the email and reciprocate it, they use your response to hack into your computer and steal the information they deem necessary.

Unauthorized use of your organization’s system privileges

While unauthorized use of system privilege is far less common compared to the popular spam attack, in stark contrast it is more personal and can be employed by someone with direct access to the system. For example, a worker with administrative access could steal financial information from the company they work for effortlessly, or an opposing company could get access to the system privileges and destroy data to rig the website. 

 Loss and theft of devices

Loss of devices is different from theft when comparing severity; for theft, devices can be deliberately taken with a motivation involved. If the device is stolen intentionally, the information stored on it can be taken out or replaced with ease by the attacker.  A loss of the devices would include carelessness or error on the employees and administrator’s part, which would pose a slightly less risk when compared to being stolen.

Ransomware

Ransomware is a technologically advanced form of attack made against devices data directly. The ransomware typically locks up important files and encryptions, demanding a ransom payment before allowing access to the information once more.

Account Takeover

Account takeover is the process of an attacker gaining internal access by stealing an account through fake passwords, emails, and external devices usually gained through phishing and stolen data.

Know yourself: Identify at least 5 digital processes, systems, and/or functions your company has in place. Importantly, address how could those be exploited or manipulated in order to gain access to valuable corporate or customer data?

Digital systems are especially at risk of negative intervention, but understanding how a website functions and performs is the first step to prevention and identifying errors made.

The top digital processes performed at this company website is as follows;

Applications

Applications are the software used for easily over-seeing work done across the site and information collected. They allow administration to monitor activity across every nook and cranny of the website and what goes into it, but if it were to be tracked by unwarranted attackers every business opportunity, website interaction, or communication could be documented and traced.

Infrastructure

Infrastructure involves the process of good production and supply stock. For this company’s production of food, an attack may destroy daily stock analysis, supplier communications, ratings and exportation of services.

Enterprise applications

Enterprise applications are implicated on the website to improve communication and timeliness with employees, clientele, suppliers, business partners, and to coordinate data. If the enterprise applications were to be threatened or hacked into, access to sensitive materials and service logs could be found and exploited.

Engineering

The website’s engineering is the process that ensures the screen speed, load quality, and internal data is optimized and easy to maneuver, look at, and run.  By exploiting the engineering of the website, attackers can destroy the general functionality of it to prevent site usage or rewire it.

Security

 Security is the site’s critical ability to remain protected from viruses and data theft, utilizing safety malware that defends the firewall to prevent an attack. With security, it can be infiltrated by bugs and hackers removing the protective measures or false offers for a new malware assistant that will create more damage.

Develop your strategy: As the chief technology executive, make 5 recommendations that your company should adopt to be more safe, secure, and reliable. Again, consider hardware, software, networks, and human policies and procedures. (e.g., appropriate use policy on corporate computers; firewall; SSL/web encryption; backup/retention)

While threats can poke their heads around the corner at any time for businesses, there are listless ways to defend and prevent lasting, or even subtle, damage that they can do.

My top recommendations are as follows;

A secure web host

A secure web host can go a long way, ensuring that all data listed on the site is protected including sensitive information like SSIDs, credit cards, and addresses. The user’s protection is put first with a secure web host, “GoDaddy” being a strong example with its ability to find a safe host affordably.

Recording user activity and privileges

A good software that monitor’s user activity thoroughly can help prevent undesired access to information, “Mouseflow” is an example of an accessible system that comes with a variety of options for analytics, tracking, and even problem identification.

Extension for email filtering

Email infiltration is a highly common problem among people, but an extension for filtering out spam emails can prevent minor mishaps. “Barracuda” acts as a security software that mainly monitors email activity and internet safety, reporting even the slightest change in your website’s firewalls.

Software for monitoring data efficiently

Monitoring is vital for any aspect of business; from website access and internet security to stock data and sale statistics. “Datto” specializes in monitoring the data aspects, listing communications and sales clearly and thoroughly at an affordable price.

Inventory analysis assistance

Inventory analysis is equally as important as sale statistics, and utilizing a system like “TowneBank” can help to monitor supply costs, counts, and availability.

 

https://www.mass.gov/service-details/know-the-types-of-cyber-

threatshttps://www.exabeam.com/information-security/cyber-security-

threat/https://www.cognizant.com/us/en/glossary/digital-systems-and-

technologyhttps://www.gartner.com/en/information-technology/glossary/enterprise-applications

WK6 Where Can You Turn For Help?

Technology changes very rapidly, how current is the information you found?
Who is posting the information? Are they an authority on the matter? How can you tell?
What types of gatekeeping mechanisms are in place for the source you found? (i.e., is there an editor or are posts up/downvoted democratically?)
Discuss the quality of the information. Is it well written, clear, and easy to follow? 
Finally, is this a resource you might use in the future, and if so, why?
Good Old Fashioned Pancakes

https://www.allrecipes.com/recipe/21014/good-old-fashioned-pancakes/

  • The date this post was made is not known, but the last 3 reviews are dated freshly to 10/02/2022, 10/01/2022, and 9/29/2022!

Dakota Kelly is the author of this tutorial. While most information on Kelly is private or irrelevant to the viability of her pancake recipe, I can assume that the pancake recipe may be easy to work with based on ingredients and the reviews.

While there may not be gatekeeping mechanisms used on All-Recipe’s website, a  missed ingredient leading to overly saturated batter, cooking too long, or adding too much of one ingredient and ruining the pancakes have led to the occasional negative feedback.

The information is well written and easy-to-read, allowing the user to follow the recipe effortlessly. The ingredients are listed and measured for making the batter, going as far as to add a tutorial video and example images. I would, and have, used this recipe multiple times before and the pancakes usually have a great taste as long as they are cooked correctly. The site that the recipe was posted on has numerous other successful recipes, including various other meals, deserts, and breakfast foods.

How to Identify 10 Red and Pink Minerals.

https://www.thoughtco.com/red-and-pink-minerals-1440941#:~:text=Rose%20Quartz,-Petri%20Oeschger%2FGetty&text=The%20color%20ranges%20from%20the,Luster%20glassy%3B%20hardness%207.

  • June 22, 2019 was the last update made to the article. The information is relatively recent, and the information remains applicable to identifying the listed minerals and crystals.

Andrew Alden edited and wrote the information available. According to the website, Alden is a professional in Earth Sciences at the University of New Hampshire – he performs with a bachelor’s degree in geology and is working as an editor and author for ThoughtCo!

While Alden is an editor working for the site, the information being shared is not biased due to it being observation and directional rather than sharing information like local news channels.

The information that is shared is short and sweet, getting to the point and briefly explaining the differences among the minerals and how they can be individually be identified just as the title implies; however, I would not utilize this source in the future as I would prefer a more in-depth explanation between crystal identification that specifies in the mineral I am identifying. ThoughtCo offers various articles for scientific experiments, discoveries, and furthered research for the user’s convenience. It has a lot to offer for people with a curious mind.

Russia-Ukraine War: Ukrainian Forces Patrol Strategic City After Russia’s Hasty Retreat

https://www.nytimes.com/live/2022/10/02/world/russia-ukraine-war-news

  • Oct 2, 2022 is the latest update, as the source is LIVE on NYtimes’ website and offering constantly updated information with photographical evidence.

Melissa Eddy continues to update the article on the daily. Eddy is described on her own page by the New York Times,

“Melissa Eddy is a correspondent based in Berlin who covers German politics, social issues and culture for The New York Times. Her most recent work has delved into the challenges of integrating one million refugees, the spate of Islamist terror attacks and the legacy of a trove of Nazi-looted art.”

She is a professional in the correspondent industry, and was tasked with monitoring and sharing first-hand the description of the events she witnessed.

There is a chance that the author does gatekeep aspects of information from the written description of the events, but furthermore the information is shared clearly from a first-hand perspective at a renowned, trusted source. Photo evidence is left on the page for viewers to get a visual, and the author is linked to her own page where it lists her credentials.

The information that is shared is extremely thorough and descriptive, sharing in detail the events that were witnessed and experienced through the informational investigation. The New York Times has long since been a valued news outlet for the public, consistently sharing events since 1851 reliably and in good time. To this day their information shared remains useful and trusted, I would absolutely come back to this site for further reference.