Page 23 - Cyber Defense eMagazine - September 2017
P. 23

Common-sense should be applied to these circumstances. This and other successful attacks
               may all be used for training and to improve the business security stance.

               Resources

               Arsene,  L.  (2017,  June  12).  Southern  Oregon  university  victim  of  $1.9  million  email  fraud.
               Retrieved from  https://hotforsecurity.bitdefender.com/blog/southern-oregon0university-victim-of-
               1-9-million-email-fraud-18197.html


               Cluley,  G.  (2017,  June  13).  How  a  single  email  stole  $1.9  million  from  Southern  Oregon
               University.     Retrieved     from      https://www.tripwire.com/state-of-security/security-data-
               protection/single-email-stole-1-9-million-southern-oregon-university/#new_tab

               Dellinger,  A.J.  (2017,  June  13).  Fraudulent  email:  Business  email  compromise  attack  costs
               southern  Oregon  university  $2M.  Retrieved  from  http://www.ibtimes.com/fraudulent-emial-
               business-email-compromise-attack-costs-southern-oregon-university-2m-2551724



               About the Author

                                             Charles Parker, II began coding in the 1980’s. Presently CP is an
                                             Cybersecurity  Lab  Engineer  at  a  Tier  One  supplier  to  the
                                             automobile industry.

                                             CP is presently completing the PhD (Information Assurance and
                                             Security) with completing the dissertation. CP’s interests include
                                             cryptography, SCADA, and securing communication channels.

                                             He  has  presented  at  regional  InfoSec  conferences.  Charles
                                             Parker,  II  can  be  reached  online  at  [email protected]
                                             and InfoSecPirate (Twitter).




















                    23   Cyber Defense eMagazine – September 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   18   19   20   21   22   23   24   25   26   27   28