• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
/ Cybersecurity

Cybersecurity

Group logo of Cybersecurity
Public Group active 4 hours, 11 minutes ago

Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.

  • Home
  • Forum
  • RSS
  • Why is disaster recovery important?

    If yours is an organisation that is a new player in the corporate world, you should focus on the business continuity plan and the disaster recovery plan as well. Talking about both of these strategies, we should understand that all the organisations need it because it gives them a road map of the future trajectory…
    Read this Discussion
       Posted: 12/18/2020 13:28:28 By assuredgrc
    Discussion
  • Sunburst Malware are being use to Target Government around the world !

    https://cyware.com/news/global-campaign-uses-sunburst-malware-to-target-government-agencies-worldwide-2f9f9ef0
    Read this Discussion
       Posted: 12/16/2020 04:49:09 By kerblu27
    Discussion
  • Best universities for MSc degree in Cyber Security in Europe

    Which countries have the best universities for MSc degree in Cyber security and which universities are they specifically?
    Read this Discussion
       Posted: 12/15/2020 11:33:55 By NefeliEva
    Discussion
  • Hacker targeted military component unit!

    https://www.reuters.com/article/italy-leonardo-cyber-prosecutor/leonardo-hack-targeted-commercial-military-component-unit-police-officer-idUSKBN28L2E1?&web_view=true
    Read this Discussion
       Posted: 12/14/2020 06:15:50 By kerblu27
    Discussion
  • K-12 Attacks

    Since August the FBI has said that there has been a huge rise in cyber attacks on schools all around the country. Many of those attacks have been ransomware. Ever since schools started back up this year FBI has been seeing a huge increase cyber attacks on school which they suspect that it is getting…
    Read this Discussion
       Posted: 12/13/2020 03:37:40 By mabuzamak
    Discussion
  • Tech unicorn UiPath discloses data breach

    Reply To: Huntsville City Schools Experience Ransom
    Read this Discussion
       Posted: 12/12/2020 13:08:40 By srisara
    Discussion
  • Hacker are taking advantage of WinZip and causing trouble

    https://www.bleepingcomputer.com/news/security/hackers-can-use-winzip-insecure-server-connection-to-drop-malware/?&web_view=true
    Read this Discussion
       Posted: 12/11/2020 04:47:23 By kerblu27
    Discussion
  • How can schools protect their systems during COVID-19

    Bearing in mind that these systems were not made for everybody to learn from home.
    Read this Discussion
       Posted: 12/09/2020 01:06:09 By spoofy
    Discussion
  • FireEye

    https://arstechnica.com/information-technology/2020/12/security-firm-fireeye-says-nation-state-hackers-stole-potent-attack-tools/ We just utilized them with a cyber-security response plan. Crazy how many resources are out there on the offensive.
    Read this Discussion
       Posted: 12/08/2020 23:39:14 By klang224
    Discussion
  • Interested to know the AI tools for continuous monitoring

    Hi would be great to know if ready prebuilt AI based on the various patterns on logs observed in the cyber attacks for the networks , firewalls, tunnels, access, traffics is available and gives significant proactive management of upcoming or APT situations
    Read this Discussion
       Posted: 12/08/2020 17:35:32 By Lasu
    Discussion
  • Educational System is Not Ready For The Next Age Of Learning

    During the pandemic, all schools were moved to online. During this time everyone saw online learning in a different light. It was no longer looked down upon, it was rather looked at as a new way to learn and communicate. However even tho it is the main way of learning now, not many steps were…
    Read this Discussion
       Posted: 12/07/2020 23:54:40 By ikuzmich04
    Discussion
  • What metrics or measurements qualifies a cybersecurity program as effective?

    It's quite fascinating as we have various cybersecurity programs running across multiple sectors and industries, but find it really difficult to have a common approach on measuring its success. I am happy to learn about frameworks or models that can be adopted for measuring an effective or successful cybersecurity program.
    Read this Discussion
       Posted: 12/07/2020 23:13:22 By abuigboa
    Discussion
  • Cybersecurity trends and threats that we will see against FI's?

    With new technologies coming up such as 5-G, more team members working from home, and things happening remotely, financial institutions are at a higher risk than ever before. FI's are held responsible for the security of client data, personal and financial. Cybersecurity is an area that FI's will need to focus and invest in the…
    Read this Discussion
       Posted: 12/07/2020 20:45:45 By ask_2020
    Discussion
  • Cyber Security financial sector resources

    What are some of the best free resources a security professional in the financial sector should be aware of?
    Read this Discussion
       Posted: 12/07/2020 15:09:23 By agutierrez6
    Discussion
  • The future of privacy law and its impact on global business behaviour

    In the January 2020 edition, Gartner published predictions about the future of privacy law world wide. The report includes a number of statistical information around the current state of privacy law around the globe. This includes the fact that over the past few years, over 60 jurisdictions around the world have enacted or enhanced privacy…
    Read this Discussion
       Posted: 12/06/2020 16:05:57 By gnetaneli
    Discussion
  • TikTok sale deadline elapses as negotiations with US continue

    The Committee on Foreign Investment in the United States gave the company, ByteDance a seven day extension to satisfy the government order to sell the app. There was an August executive order issued by President Trump to set a deadline of Nov. 12. The company has received two extensions from CFIUS to allow more time…
    Read this Discussion
       Posted: 12/05/2020 18:44:39 By tbeaupre45
    Discussion
  • Huntsville City Schools Experience Ransom

    For a week, Huntsville City Schools have to continue their education without the aid of the districts' computers due to a cyber attack and ransom. The district is still attempting to figure out how far the attack had gotten, and teachers will be giving students offline work to complete. This attack could take many weeks…
    Read this Discussion
       Posted: 12/04/2020 04:50:45 By mbukovsky12
    Discussion
  • Kmart Have Been Infiltrated

    The hacking group have a encrypted system connected to kmart network. The group have been threating to steal all of Kmarts information including backup information. The hackers are asking for ransomwares or else they will execute.
    Read this Discussion
       Posted: 12/04/2020 02:34:11 By mabuzamak
    Discussion
  • Zoom Impersonation Attacks Aim to Steal Credentials

    REcently the BBB or Better Business Bureau has announced and warned of a new Zoom attack. This attack uses the Zoom's logo and reciepients are told that their accounts will be banned. The user is then prompted with a link that is told to "reactivate" their account, but instead their crednetials are then stolen and…
    Read this Discussion
       Posted: 12/02/2020 19:50:18 By cfernandez06
    Discussion
  • iPhone Bug Allowed for Complete Device Takeover Over the Air

    Recently a new iPhone exploit has come to light. A researcher from Google's Project Zero names, Ian Beer, has figured out how a radio-proximity exploit worked. This exploit was a memory corruption bug that was only patched within this year. This bug allowed malicious users to "view all the photos, read all the email, and…
    Read this Discussion
       Posted: 12/02/2020 19:46:26 By cfernandez06
    Discussion
  • Load More

sidebar

Community Sidebar

Featured Content

Data Privacy Day is January 28th

You can help create a global community that respects privacy, safeguards data, and enables trust. You can help teach others about privacy at home, at work, and in your community.

Learn How

Featured Subject Matter Expert (SME): Daksha Bhasker

A dynamic CSIAC SME, Senior Principal Cybersecurity Architect, Daksha Bhasker has 20 years of experience in the telecommunications services provider industry. She has worked in systems security design and architecture in production environments of carriers, often leading multidisciplinary teams for cybersecurity integration, from conception to delivery of complex technical solutions. As a CSIAC SME, Daksha's contributions include several published CSIAC Journal articles and a webinar presentation on the sophiscated architectures that phone carriers use to stop robocalls.

View SME's Contributed Content

The DoD Cybersecurity Policy Chart

The DoD Cybersecurity Policy Chart

This chart captures the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme.

View the Policy Chart

CSIAC Report - Smart Cities, Smart Bases and Secure Cloud Architecture for Resiliency by Design

Integration of Smart City Technologies to create Smart Bases for DoD will require due diligence with respect to the security of the data produced by Internet of Things (IOT) and Industrial Internet of Things (IIOT). This will increase more so with the rollout of 5G and increased automation "at the edge". Commercially, data will be moving to the cloud first, and then stored for process improvement analysis by end-users. As such, implementation of Secure Cloud Architectures is a must. This report provides some use cases and a description of a risk based approach to cloud data security. Clear understanding, adaptation, and implementation of a secure cloud framework will provide the military the means to make progress in becoming a smart military.

Read the Report

CSIAC Journal - Data-Centric Environment: Rise of Internet-Based Modern Warfare “iWar”

CSIAC Journal Cover Volume 7 Number 4

This journal addresses a collection of modern security concerns that range from social media attacks and internet-connected devices to a hypothetical defense strategy for private sector entities.

Read the Journal

CSIAC Journal M&S Special Edition - M&S Applied Across Broad Spectrum Defense and Federal Endeavors

CSIAC Journal Cover Volume 7 Number 3

This Special Edition of the CSIAC Journal highlights a broad array of modeling and simulation contributions – whether in training, testing, experimentation, research, engineering, or other endeavors.

Read the Journal

CSIAC Journal - Resilient Industrial Control Systems (ICS) & Cyber Physical Systems (CPS)

CSIAC Journal Cover Volume 7 Number 2

This edition of the CSIAC Journal focuses on the topic of cybersecurity of Cyber-Physical Systems (CPS), particularly those that make up Critical Infrastructure (CI).

Read the Journal

Recent Video Podcasts

  • Agile Condor: Supercomputing at the Edge for Intelligent Analytics Series: CSIAC Webinars
  • Securing the Supply Chain: A Hybrid Approach to Effective SCRM Policies and Procedures Series: The CSIAC Podcast
  • DoD Vulnerability Disclosure Program (VDP) Series: CSIAC Webinars
  • 5 Best Practices for a Secure Infrastructure Series: The CSIAC Podcast
  • Fifth Generation Cellular – A Discussion with Idaho National Laboratory on 5G – Part 4 Series: Fifth Generation Cellular
View all Podcasts

Upcoming Events

Mon 18

SANS Stay Sharp: Blue Team Operations 2021

January 18 - January 20
Organizer: SANS Institute
Mon 18

SANS Cyber Security Central: Jan 2021

January 18 - January 23
Organizer: SANS Institute
Tue 19

AI Champions, Online – Supply Chain

January 19 @ 14:00 - January 21 @ 15:30 EST
Thu 21

SANS Cyber Threat Intelligence Summit 2021

January 21 - January 22
Organizer: SANS Institute
Fri 22

SANS Cyber Threat Intelligence Solutions Track 2021

January 22 @ 09:00 - 17:00 EST
Organizer: SANS Institute
View all Events

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
US Department of Defense Logo USD(R&E) Logo DTIC Logo DoD IACs Logo

Copyright 2012-2021, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information
Accessibility / Section 508 | FOIA | Link Disclaimer | No Fear Act | Policy Memoranda | Privacy, Security & Copyright | Recovery Act | USA.Gov

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.