Trident University International

HACKERS HELP TO STRENGTHEN U.S. CYBER SECURITY

Posted by Dr. Pietro Savo on Sep 7, 2016 11:10:44 AM

Note: this is the follow-up to a blog on cyber security and hacking that we posted last month.

Earlier this year, the United States government hired a team of hackers to exploit flaws in the Pentagon’s Cyber Systems. A system penetration occurred not once, not twice, but over 130 times.

This was part of the Department of Defense’s "Hack the Pentagon" event, which was labeled as the first ever "bug bounty" in the US federal government history. Over 1,400 hackers were contacted to take part in this exercise, invited to find cyber security weaknesses with five government public websites, including defense.gov, between April 18 and May 12. During that period, the hackers reported 1,189 vulnerabilities, with 138 of them determined to be "legitimate, unique and eligible for a bounty.”

Read More

Topics: Information Systems, Military Education, Veteran Education, Cybersecurity

HOW VULNERABLE IS THE UNITED STATES TO A MAJOR CYBER ATTACK?

Posted by Dr. Pietro Savo on Aug 5, 2016 11:31:30 AM

The United States government hired a team of hackers, instructing them to exploit flaws in the Pentagon’s Cyber Systems. Due to their actions, a system penetration occurred over 130 times. After these “attacks,” the Pentagon will assess the damage and develop countermeasures against them – and then the cycle starts over as the hackers start to look for more flaws to assess. Cyber security is a never-ending process.

While we have sophisticated systems, we also have sophisticated enemies requiring sophisticated defense and offensive methodology.

Read More

Topics: Information Systems, Military Education, Veteran Education, Cybersecurity, College of Health and Human Services

COMBATING CYBER WARFARE WITH EDUCATION

Posted by Dr. Pietro Savo on May 23, 2016 11:42:43 PM

The next war will not come in the form of military tanks, ships, or bombers. The next war - bound by no physical boundaries - is called the cyber war. A greater dependency on technology is needed to win tomorrow’s fight. This technology provides us and our enemy easy access across each other’s borders (Gargan, 2016).  Education will play a significant part in winning a cyber war and preparing proficient cyber warriors. 

Read More

Topics: Veterans, Faculty, Military, Cybersecurity, Emergency Disaster Management

HOMELAND SECURITY BY SEA, BY AIR, BY LAND

Posted by Dr. Pietro Savo on Apr 20, 2016 9:11:41 AM

515X285_airandmarine.jpgToday, we are indeed all linked to each other by the Internet; we are using smartphones, tablets, laptops, and desktop computers. The Internet and digital data sharing, is not designed to be secure but to be open and accessible. Accessibility however, comes with threats, risk to data, risk to infrastructure security, and risk to system’s controls. The phrase cyber threat has become our reality. 

By sea, 90% of the goods transported around the planet are by oil tankers and container vessels that travel our oceans (Wagstaff, 2014). The ships’ crews get smaller and ships get larger as we focus technology on automation, remote monitoring, and navigational systems, these can be cyber attacked. Researchers from the University of Texas verified that it was possible to change a ship's direction by simulating a GPS signal to target a ship’s onboard navigation system (Schmidt, 2015). Somali pirates are surfing the Internet for information that can help them with targeting vulnerable and valuable ships (Cyber; Information Security; Crime; Maritime, 2016). Pirates have the ability to access databases, which gives them access to a ship’s blueprints. Once they have the blueprints, they know where the ship is headed and what cargo is on board. (Klöcker, 2016).

Read More

Topics: Military, Cybersecurity, Homeland Security, College of Health and Human Services

HOW CYBERATTACKS AFFECT OUR HOMELAND SECURITY

Posted by Daniel Sloan on Mar 8, 2016 10:38:10 AM

Last week we discussed cyberattacks and the impact they had on a hospital in Los Angeles. This type of attack, known as a Distributed Denial of Service (DDoS), can have severe ramifications from the perspective of homeland security. There are numerous state and non-state actors who have the potential to hurt the United States through a cyberattack.

According to literature prepared by Dr. Rudolph Bustos, who is the Faculty Lead for Trident’s Bachelor and Master of Science in Homeland Security programs, as well as faculty member Dr. Robb Pilkington, cyber attacks (terrorism) “are the disruptive use of information technology by terrorist groups to further their ideological or political agenda and/or hackers for financial gains. This takes the form of attacks on networks, computer systems, and telecommunication infrastructures.”

Read More

Topics: Veterans, Military, Cybersecurity, Careers

HOW EDUCATION CAN HELP PREVENT CYBERATTACKS

Posted by Daniel Sloan on Mar 2, 2016 11:00:00 AM

Last month a hospital in Los Angeles was the victim of a serious attack. Rather than the type of attack that most people would expect, the Hollywood Presbyterian Medical Center lost access to its email and electronic health records for more than a week due to a cyberattack.

This is a serious crime that occurs often – a hospital in Philadelphia saw a similar attack recently, as well as small police departments in Massachusetts, Tennessee, and New Hampshire. According to the Los Angeles Times, at least 158 medical providers, insurers, and hospitals have reported being hacked since 2010.

Read More

Topics: Information Systems, Faculty, Master's Degrees, Veteran Education, Bachelor's Degrees, Cybersecurity

BEYOND THE GEEK SQUAD: THE TOP 5 IT JOBS OF 2015

Posted by Trident University on Nov 19, 2015 12:00:27 PM

Knowing how to navigate the tech world is essential for success in the professional sphere. For an individual with specialized skills and a deep knowledge of technology and information infrastructure, there are almost no limits on achievement.

This blog is inspired by yearly rankings on U.S. News and World Report and includes statistics from the Occupational Outlook Handbook from the Bureau of Labor Statistics.

Read More

Topics: Information Systems, Online Learning, Military, Cybersecurity

CYBERSPACE: THE NEW BATTLEGROUND

Posted by Dr. Rudolph Bustos on Sep 8, 2015 5:00:00 AM

Growing out of asymmetric warfare—thanks to advances in technologies—is the cyber battlefield in which sensitive infrastructures are compromised or destroyed by belligerents. Pick up any newspaper or reputable internet news site, and one will read about a blatant cyberattack on a financial institution, a governmental agency, or even the Pentagon.  

Currently, the U.S. Army Cyber Command’s Cyber force has been growing exponentially for two years. The Army’s Cyber Chief, Lt. Gen. Edward C. Cardon noted: “Cyberspace continues to grow more complex, with sophisticated threats that are capable of exploiting known and unknown vulnerabilities, threatening both national security and America's economic interests.” The threat is real; the threat is growing.

The Department of Homeland Security Secretary seeks to form a new subcommittee on cybersecurity practices.

Read More

Topics: Master's Degrees, Bachelor's Degrees, College of Health Sciences, Cybersecurity, Homeland Security