Cyber Frontiers

UMD Data Breach, Securing PII Data, Two Factor Authentication, Tinder GPS Flaw, Intro to Honeypots – CF002

Christian Johnson joins Jim (@jcollison) for show #2 of Cyber Frontiers brought to you by the Average Guy Network. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does.  Never on a schedule, but always up to date! You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Listen Mobile: Security News for the Day: UMD Data Breach: What You’ve All Been Asking about: Official statements from UMD: <My Disclaimer> – Any opinions regarding this matter are that of my own and not the university’s. All media inquiries related to this incident should be directed to the University’s Chief Communications Officer at: “A specific database of records maintained by our IT Division was breached yesterday.  That database contained 309,079 records of faculty, staff, students and affiliated personnel from the College Park and Shady Grove campuses who have been issued a University ID since 1998. The records included name, Social Security number, date of birth, and University identification number.  No other information was compromised — no financial, academic, health, or contact (phone, address) information.” “University of Maryland Police Department is working with the Secret Service on this matter.  Additionally, we have partnered with MITRE, a leading systems engineering company specializing in cybersecurity, to provide additional forensic analysis on how this attack happened, and how to prevent such attacks in the future.” “The breached records included name, Social Security number, date of birth, and University identification number.  No financial, academic, health or contact information was accessed.” Google “umd magnetic card reader” for further examples on how breaches can occur Other universities have had this problem too: Tinder Dating App: All things in current news related to privacy, security, the government, and us. Examples of where the government has been implementing two form authentication for the common citizen: Cyber Special: Introduction to honeypots: Doing a home listener honeypot? – Is it practical? For those of us running websites, this might be a cool way to try some hands on experience in protecting your web stack: Project Honeypot: Good resource for using data generated through this honeynet service: Support the Average Guy Tech Scholarship Fund: Facebook Page:  Facebook Group: Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Cyber Frontiers

Cyber Frontiers – Exploring Cyber Security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective – CF001

Christian Johnson joins Jim (@jcollison) for show #1 and the Pilot of Cyber Frontiers brought to you by the Average Guy Network. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does.  Never on a schedule, but always up to date! You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Listen Mobile: Welcome/Podcast Introduction — Origins from Christian’s Corner —What’s the purpose – History, Current Events, and Technical Training —Interactive Events Planned What is Big Data? What is Cyber security? Definitions Big data – term for a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications. Cyber security – the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this. History of Big Data in a nutshell “Big data and network science are going to merge, marrying the internet of data with the internet of things in new ways, and this will be world changing. Just as in the 1800s there was a shift from electricity as a curiosity to a commodity made possible by the emergence of electrical engineering, so too now are we in the midst of a shift in data as a commodity, and more importantly as a resource, in ways not previously imagined” — Shirley Ann Jackson, RPI History of Cyber Security in a Nutshell —It’s more than just the technical aspects. Legal, economic, personal, etc. Privacy implications, living implications, to the point where our most important functions in society have moved to a cyber world. How are these topics related? (Discussion) Education Institutions Are at the Forefront Support the Average Guy Tech Scholarship Fund: Facebook Page:  Facebook Group: Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at
Continue Reading »