What is YOUR Opinion?

Mobile Assignment 4

In my previous post, and in popular news, the average person is aware of the recent ” cyber attack” that North Korea made against Sony (upon the controversial release if the movie “The Interview”). To recap, a group of hackers basically shut down all Sony devices by hacking in to the system.

According to the Chicago Tribune, the US established sanctions against North Korea. This marks the first act of retribution by the US towards North Korea.

Carnegie Mellon and Computer Hacking

Students at Carnegie Mellon University, one of the nation’s top computer science schools, are learning to fight off the bad guys by thinking the same way they do.They’re learning to be ethical hackers. Carnegie Mellon founded the CyLab in 2003 and is one of the largest university- based Cybersecurity research and education center.

US CyLab is the National Science Foundation, cybertrust center, and the National Security Agency including CAE-IA/ CD, Center for Academic Excellence in Information Assurance/Cyber Defense Research (CAE-R) and Center of Academic Excellence in Cyber Operations (CAE- Cyber Ops).

Carnegie Mellon’s students are so good at exploiting those vulnerabilities that the NSA enlisted them to create a game that teaches hacking skills to high-school-aged students and paid for the job.

Creating a strong offense by educating college undergrads to become ethical hackers is the strongest defense. [tag Email-post-4]

In Due Time…

In response to The Daily Post’s writing prompt: “In Due Time.”

My next, most pressing deadline would probably have to be Graduation and finding a job by then or soon after. While I have enjoyed the past three and a half years here at the University of Alabama, I am more than ready to move on to a new chapter in my life. Originally from Houston, Texas, I came to Alabama for a change of environment and have grown so much. I am excited, as well as stressed because I know the job searching process is not easy and the real world is significantly different than college. I will no longer be relying on my parents as much, and will be making decisions on my own. Also, managing time and money is going to be a big change.

Continue reading

The Interview Made $1 Million at the Christmas Box Office


The Interviewbrought in $1 million at movie theaters on Christmas Day and could make several million more over the holiday weekend, following the controversial movie’s limited release.

“The audience reaction was fantastic—the limited release, in under 10% of the amount of theaters originally planned, featured numerous sellouts and a first-day gross over $1 million,” Sony Pictures worldwide distribution president Rory Bruer said in a statement, CNN reports.

[time-gallery id=”3637680″]

The comedy, which stars Seth Rogen and James Franco and depicts an attempt to assassinate North Korean leader Kim Jong Un, was initially pulled from theaters when hackers threatened 9/11-style attacks on theaters that screened it. The U.S. has blamed North Korea for a crippling cyberattack on Sony, apparently in response to the film.

After independent theaters decided to screen the movie, Sony announced it was releasing it online as an alternative. Many large theaters are still not playing…

View original post 74 more words

UNM To Teach Students To Be Hackers


The University of New Mexico is testing out a new summer camp to teach students to learn the art of computer hacking. The point of this is to educated students about the field of computer science in hopes that they will then want to pursue a degree in computer science. After all, fresh out of college, working in cyber security, an employee can start out making $70,000.

Ethical Hacker Job Titles

-IT network security administrators: Responsible for the overall security of the network

-Network defense analysts: Analyze firewalls to ensure that they cannot be breached

-Application security testers: Specialize particular applications for loopholes and vulnerabilities

– Web security administrators: Ensures IT network of a website is not hacked

-Forensic analysts: Identify the source of the attack

-Security auditors: Asses complexity of passwords so that only authorized users have access

-Penetration testers: (network security surveillance) Aware of all the potential ways a hacker would break into a system