Tag Archive for: public

CISA announces free security scans for public water utilities


The U.S. Cybersecurity and Infrastructure Security Agency is offering free security scans for critical infrastructure facilities, such as water utilities, to help protect them from cyberattacks.

The midweek announcement comes as water treatment facilities across the country have suffered from rising security threats over the past two years, including a recent attempt to compromise the safety and protection systems of the water treatment facility in Discovery Bay, California, by a former employee of one of the plant’s vendors.

In 2021, CISA and other agencies, including the FBI, Environmental Protection Agency and National Security Agency, issued a joint advisory report documenting the ongoing cybersecurity vulnerabilities in water systems nationwide, which “threaten their ability to provide potable water and effectively manage their wastewater.”

Drinking water and wastewater systems often offer public-facing applications that can be vulnerable to attack, potentially disrupting or halting operations.

CISA agents run specialized scanners to identify a facility’s vulnerabilities and weak configurations in internet-exposed endpoints, commonly used for initial access by threat actors and some ransomware groups.

Depending on the severity of flaws and vulnerabilities found, reports are generated within one to six days. The federal agency sends weekly reports with recommendations, while further scans determine if the water utilities have taken the steps to solve previously disclosed issues.

CISA’s new no-cost scanning program was co-developed with the EPA, the Water Sector Coordinating Council and the Association of State Drinking Water Administrators. CISA encouraged all drinking water and wastewater system operators to enroll in the service.

In the announcement, CISA said it aims to significantly reduce identified vulnerabilities in the first few months of security scans.

Source…

Decoding the Mystery of Encryption: The Power of Public and Private Keys | by Yash Gupta | Sep, 2023


“In the world of encryption, the key to understanding is just a public and private key away.” — Anonymous

In the digital world, the concept of encryption is as ubiquitous as it is vital. It is the bedrock of internet security, safeguarding our data from prying eyes. Encryption is the process of encoding information in such a way that only authorized parties can access it. It is a complex yet fascinating subject, and understanding it requires a deep dive into the realm of public and private keys.

Public and private keys form the basis of today’s encryption

The world of encryption is a labyrinth of complex algorithms and mathematical equations, but at its core, it is a simple concept. It is a method of transforming plain text into an unreadable format, known as ciphertext, to prevent unauthorized access. The process of converting the ciphertext back into its original form is known as decryption.

The two primary types of encryption are symmetric and asymmetric encryption. Symmetric encryption uses a single key for both encryption and decryption. However, it has a significant drawback: the key must be shared between the sender and receiver. This sharing can lead to potential security risks.

Asymmetric encryption, on the other hand, uses two keys: a public key for encryption and a private key for decryption. This method is also known as Public Key Infrastructure (PKI). The public key is available to everyone, while the private key is kept secret by the owner. This method eliminates the need to share keys, thereby enhancing security.

The concept of public and private keys is akin to a mailbox. Anyone can drop a letter (encrypt data) into the mailbox using the visible slot (public key), but only the person with the key to the mailbox (private key) can open it and read the letters (decrypt the data).

The process of generating these keys involves complex mathematical algorithms. The most common algorithm used is the RSA (Rivest-Shamir-Adleman) algorithm. It generates two large prime numbers and multiplies them. The complexity of factoring large prime numbers ensures the security of RSA encryption.

The beauty of public and private keys lies in their interdependence. The public key is used…

Source…

Minneapolis Public Schools has begun to contact families whose data was accessed in February hack


Source…

Prince George’s Co. Public Schools: Data stolen in ransomware attack could be posted online


Officials with Prince George’s County Public Schools say some data stolen in a ransomware attack earlier this month could be posted online — and the school system will now be offering credit monitoring and identity-theft protection services.

Officials with Prince George’s County Public Schools say some data stolen in a ransomware attack earlier this month could be posted online — and the Maryland school system will now be offering credit monitoring and identity-theft protection services.

“We have worked diligently to restore our systems to operability as quickly as possible, and we are investigating the incident with outside cybersecurity and forensic specialists. However, we have learned that some personal information may be released online by those responsible for the cyber attack,” new Prince George’s County Public Schools Superintendent Millard House said in a message to the school community members on Saturday.

School officials said the system still does not know the full extent of the material that has been potentially compromised.

House’s message said the stolen data includes “identification details,” but other than that, “we do not yet know the full extent of the information relating to you, or to others, that may be affected.”

He said the school system, working with outside experts, will be taking steps to perform a “detailed review of all data that may have been compromised to identify any sensitive information impacted by this event” and will then begin notifying those affected.

That review is expected to take several weeks.

Credit-monitoring and identity-theft protection services will be provided by Experian. In addition, starting Saturday, the school system urged members of the school community to check their financial statements and accounts.

Last week, the school system first revealed its network had fallen victim to a “cyberattack” affecting about 4,500 user accounts — out of 180,000 total. Most of them were staff accounts.

The school system said it didn’t appear student information systems were affected by the data breach.

In an interview with WTOP last week, Andrew…

Source…