So you want to work in Cyber Security? Here’s a Infographic from StaySafeOnline.org
Become a company or organization that helps bring Cyber Security Awareness to users. TCAT Shelbyville has been listed as a champion for years and promotes cyber security awareness to higher education and end users.
Activities you can plan can be found here.
Below is a list of activities promoted on the DHS website.
|Week One: Oct 1-3
Promoting Online Safety with the Stop.Think.Connect.™ Campaign
|Cybersecurity is a shared responsibility, and everyone can take a few simple steps to make the Internet more secure. This week will also highlight efforts related to Executive Order 13636 to strengthen the security and resilience of the nation’s critical infrastructure.|
|Week Two: October 6-10 Secure Development of IT Products||Building security into information technology products, including the phones, tablets, and computers we use every day, is key to enhanced cybersecurity.|
|Week Three: October 13-17
Critical Infrastructure and the Internet of Things
|Highlights the importance of protecting critical infrastructure and properly securing all devices, including household items, that are connected to the Internet.|
|Week Four: October 20-24
Cybersecurity for Small and Medium-Sized Businesses and Entrepreneurs
|Showcases what emerging and established businesses can do to protect their organization, customers, and employees.|
|Week Five: October 27-31
Cyber Crime and Law Enforcement
|Working with law enforcement to combat cyber crime and educate the public on how to protect themselves from online crime.|
National Cyber Security Awareness Month (NCSAM) – celebrated every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online.
The Tennessee College of Applied Technology – Shelbyville is listed as a champion.
Information for -
- College Administrators
- Community-Based Organizations
- Faith-Based Organizations
- Home Users
- K-12 Administrators
- Local Governments
- Local Law Enforcement
- Social Media
“There’s a war going on, and it’s raging here at home — not in the streets or the fields, but on the Internet. You can think of it as a war on the digital homeland. If you work for a power company, bank, defense contractor, transportation provider, or other critical infrastructure type of operation, your organization might be in the direct line of fire. And everyone can become collateral damage”
(Shared from CIO)
Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat
Date: May 7 and 8
Location: MTSU New Student Union Building
Registration: March 1, 2013
Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat will be held on the MTSU campus May 7 and 8. This event will address criminal, intelligence, disruptive, and information cyber threats and be of particular interest to city/state/federal governments, healthcare, education, transportation, financial, utilities, and business industries.
Presentations from Department of Homeland Security, TN Department of Safety and Homeland Security, Federal Bureau of Investigation, and private sector cyber security. Registration information can be found at http://www.csimtsu.com beginning March 1, 2013.
Hackers attacking SCADA systems and wreaking havoc in a nation’s critical infrastructure has become a justified concern for all countries. But, setting aside Iran and attacks against its nuclear program for a moment, the U.S. seems to attract a seemingly disproportionate amount of these kind of assaults Hackers destroy pump in U.S. water utility attack.
Over the past 10 years I have taught students that SCADA systems that are related to infrastructure or manufacturing should be guarded and off of the web if it could not be protected. With computer security hitting headlines everyday, the infrastructure behind America is often overlooked and a natural assumption that our infrastructure is safe can be misleading. Being on the internet, critical systems (SCADA) are computer systems that control many necessary and vital things such as electrical power, manufacturing, communications, water treatment, waste water, oil and gas systems.
Even when SCADA systems are protected properly, security analyst also have to look at the remote access into these systems from home computers of workers who may be on call. Infections from botnets, worms, viruses or vulnerabilities on home computers could possibly lead to infections on the SCADA systems. Work based computers that are given to workers (laptops, tablets, netbooks) should be used for work only and by the employee only. The computers (issued to the employee) should be locked down and encrypted when communicating with the SCADA system and the computer should not allow any other type of access to the web.
A recent ZDNet article, China’s cyber-militia behind U.S. blackouts? is an excellent article on the research and analysis of reports suggesting that China may be behind blackouts in the Northeast and in Florida. The article truly concludes that regardless of who may have broken in or who may have caused the blackouts the threats against our infrastructure is real.
*credit to Tech Paul for posting the article.
*The Dark Visitor - Inside the World of Chinese Hackers – Interesting blog…
*U.S. lawmakers point to China as cause of cyberattacks - source Computerworld
*Android Malware Using Blog as C&C Server (Researchers at Trend Micro have discovered a unique feature circulating in some Android-based malware. The malicious application is using a blog in China to act as a Command and Control (C&C) server.) – source Security Weekly
A recent Chinese video for the military let slip the attacking of an Alabama University. more