Trident University International

Dr. Pietro Savo

Recent Posts

HACKERS HELP TO STRENGTHEN U.S. CYBER SECURITY

Posted by Dr. Pietro Savo on Sep 7, 2016 11:10:44 AM

Note: this is the follow-up to a blog on cyber security and hacking that we posted last month.

Earlier this year, the United States government hired a team of hackers to exploit flaws in the Pentagon’s Cyber Systems. A system penetration occurred not once, not twice, but over 130 times.

This was part of the Department of Defense’s "Hack the Pentagon" event, which was labeled as the first ever "bug bounty" in the US federal government history. Over 1,400 hackers were contacted to take part in this exercise, invited to find cyber security weaknesses with five government public websites, including defense.gov, between April 18 and May 12. During that period, the hackers reported 1,189 vulnerabilities, with 138 of them determined to be "legitimate, unique and eligible for a bounty.”

Read More

Topics: Information Systems, Military Education, Veteran Education, Cybersecurity

HOW VULNERABLE IS THE UNITED STATES TO A MAJOR CYBER ATTACK?

Posted by Dr. Pietro Savo on Aug 5, 2016 11:31:30 AM

The United States government hired a team of hackers, instructing them to exploit flaws in the Pentagon’s Cyber Systems. Due to their actions, a system penetration occurred over 130 times. After these “attacks,” the Pentagon will assess the damage and develop countermeasures against them – and then the cycle starts over as the hackers start to look for more flaws to assess. Cyber security is a never-ending process.

While we have sophisticated systems, we also have sophisticated enemies requiring sophisticated defense and offensive methodology.

Read More

Topics: Information Systems, Military Education, Veteran Education, Cybersecurity, College of Health and Human Services

COMBATING CYBER WARFARE WITH EDUCATION

Posted by Dr. Pietro Savo on May 23, 2016 11:42:43 PM

The next war will not come in the form of military tanks, ships, or bombers. The next war - bound by no physical boundaries - is called the cyber war. A greater dependency on technology is needed to win tomorrow’s fight. This technology provides us and our enemy easy access across each other’s borders (Gargan, 2016).  Education will play a significant part in winning a cyber war and preparing proficient cyber warriors. 

Read More

Topics: Veterans, Faculty, Military, Cybersecurity, Emergency Disaster Management

HOMELAND SECURITY BY SEA, BY AIR, BY LAND

Posted by Dr. Pietro Savo on Apr 20, 2016 9:11:41 AM

515X285_airandmarine.jpgToday, we are indeed all linked to each other by the Internet; we are using smartphones, tablets, laptops, and desktop computers. The Internet and digital data sharing, is not designed to be secure but to be open and accessible. Accessibility however, comes with threats, risk to data, risk to infrastructure security, and risk to system’s controls. The phrase cyber threat has become our reality. 

By sea, 90% of the goods transported around the planet are by oil tankers and container vessels that travel our oceans (Wagstaff, 2014). The ships’ crews get smaller and ships get larger as we focus technology on automation, remote monitoring, and navigational systems, these can be cyber attacked. Researchers from the University of Texas verified that it was possible to change a ship's direction by simulating a GPS signal to target a ship’s onboard navigation system (Schmidt, 2015). Somali pirates are surfing the Internet for information that can help them with targeting vulnerable and valuable ships (Cyber; Information Security; Crime; Maritime, 2016). Pirates have the ability to access databases, which gives them access to a ship’s blueprints. Once they have the blueprints, they know where the ship is headed and what cargo is on board. (Klöcker, 2016).

Read More

Topics: Military, Cybersecurity, Homeland Security, College of Health and Human Services