{"id":641,"date":"2018-10-06T00:40:35","date_gmt":"2018-10-06T00:40:35","guid":{"rendered":"http:\/\/bocchinfuso.net\/?p=641"},"modified":"2018-12-16T22:16:37","modified_gmt":"2018-12-16T22:16:37","slug":"fit-mgt5155-week-6","status":"publish","type":"post","link":"http:\/\/bocchinfuso.net\/index.php\/2018\/10\/06\/fit-mgt5155-week-6\/","title":{"rendered":"FIT &#8211; MGT5155 &#8211; Week 6"},"content":{"rendered":"<p>The submissions for this assignment are posts in the assignment&#8217;s discussion. Below are the discussion posts for Richard Bocchinfuso, or you can\u00a0<a id=\"discussion_view_link\" href=\"https:\/\/floridatech.instructure.com\/courses\/629\/discussion_topics\/7559?headless=1&amp;student_id=1302\"><b>view the full discussion<\/b><\/a>.<\/p>\n<div id=\"entry_45385\" class=\"discussion_entry communication_message can_be_marked_as_read read\" data-mark-read-url=\"\/api\/v1\/courses\/629\/discussion_topics\/7559\/entries\/45385\/read\">\n<div class=\"header clearfix\">\n<div class=\"header_title\">from\u00a0<a href=\"https:\/\/floridatech.instructure.com\/courses\/629\/discussion_topics\/7559?headless=1&amp;student_id=1302\">6.2 Discussion<\/a><\/div>\n<div class=\"teaser_message\"><\/div>\n<div class=\"post_date time_ago_date\" title=\"Oct 6, 2018 4:03pm\" data-timestamp=\"2018-10-06T16:03:32-04:00\">Oct 6, 2018 4:03pm<\/div>\n<div class=\"clear\"><\/div>\n<\/div>\n<div class=\"content\">\n<div><a class=\"avatar \" href=\"https:\/\/floridatech.instructure.com\/courses\/629\/users\/1302\"><span class=\"screenreader-only\">Richard Bocchinfuso<\/span><\/a><\/div>\n<div class=\"message user_content enhanced\">\n<p>Dr. Perez and fellow classmates, first off I am incredibly tardy on this weeks post, my apologies. It&#8217;s Been a crazy week with my company being acquired and a number of competing priorities. Anyway, this week I did have the opportunity to spend an incredible amount of time in the air traveling around for regularly schedule QBRs (Quarterly Business Reviews) as well as delivering the acquisition news and what it means to our business. Unfortunately, United Airline&#8217;s Wifi service is in line with the rest of their service, but I suppose I should be happy none of the planes that I was on\u00a0<a class=\"external\" href=\"https:\/\/onemileatatime.com\/did-a-united-787-really-almost-run-out-of-fuel\/\" target=\"_blank\" rel=\"noreferrer noopener\">ran out of gas<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>.<\/p>\n<p>While I was in flight, with no internet access I had a lot of time to think about my favorite &#8220;Infamous Attack&#8221;, after a few minutes of thought it was really an easy decision. One of my favorite books\u00a0<a class=\"external\" href=\"https:\/\/www.amazon.com\/Ghost-Wires-Adventures-Worlds-Wanted\/dp\/0316037729\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;Ghost in the Wires&#8221;<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>\u00a0which takes you on a journey with Kevin Mitnick from his perspective.<\/p>\n<p>&#8220;<i>Ghost in the Wires<\/i>\u00a0reads like a contemporary \u00fcber-geeky thriller&#8230;. For those interested in computer history,\u00a0<em>Ghost in the Wires<\/em>\u00a0is a nostalgia trip to the quaint old days before hacking (and hackers) turned so malicious and financially motivated.&#8221;\u2015<strong><i>J.D. Biersdorfer,\u00a0<em>New York Times Book Review<\/em><\/i><\/strong><\/p>\n<p>The &#8220;Infamous Attack&#8221; that I chose is one perpetrated by Mitnick and told in the book\u00a0\u00a0<a class=\"external\" href=\"https:\/\/www.amazon.com\/Takedown-Pursuit-Capture-Americas-Computer\/dp\/0786889136\/ref=sr_1_1?ie=UTF8&amp;qid=1538848639&amp;sr=8-1&amp;keywords=takedown+mitnick\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;Takedown&#8221;<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>, the story of how\u00a0<a class=\"external\" href=\"https:\/\/en.wikipedia.org\/wiki\/Tsutomu_Shimomura\" target=\"_blank\" rel=\"noreferrer noopener\">Tsutomu Shimomura<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>\u00a0a security expert working at the UC San Diego Super Computer Center took down\u00a0<a class=\"external\" href=\"https:\/\/www.mitnicksecurity.com\/about\/kevin-mitnick-worlds-most-famous-hacker-biography\" target=\"_blank\" rel=\"noreferrer noopener\">Kevin Mitnick<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>, possibly the worlds most infamous hacker. In December of 1994, Mitnick broke into Shimomura&#8217;s computer and stole software that allowed access to cellular phone frequencies. This hack triggered a game of cat and mouse between Shimomura, the FBI, and Mitnick that would last four years. (Shimomura, 2017) As someone who grew up in the 80s, addicted to computers, first the\u00a0<a class=\"external\" href=\"https:\/\/pbs.twimg.com\/media\/DAmdCZfWAAEO9Zu.jpg\" target=\"_blank\" rel=\"noreferrer noopener\">TRS-80 and an acoustic coupler<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>, then a\u00a0<a class=\"external\" href=\"http:\/\/www.old-computers.com\/museum\/hardware\/commodore_modem1200_1.jpg\" target=\"_blank\" rel=\"noreferrer noopener\">Commodore 64 and my 1200 baud modem<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>\u00a0I am nostalgic about the hacking and phone phreaking that took place in the 80s and 90s. I have always been intrigued by the early hackers like Captain Crunch and others because they were the pioneers. In the early BBS (bulletin board systems) like\u00a0<a class=\"external\" href=\"https:\/\/en.wikipedia.org\/wiki\/ExecPC_BBS\" target=\"_blank\" rel=\"noreferrer noopener\">Exec-PC BBS<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>, the entire community was filled with\u00a0<a class=\"external\" href=\"http:\/\/www.security-faqs.com\/what-are-the-main-differences-between-hackers-and-crackers.html\" target=\"_blank\" rel=\"noreferrer noopener\">hackers, crackers,<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>\u00a0and\u00a0<a class=\"external\" href=\"https:\/\/www.techopedia.com\/definition\/4050\/phreaking\" target=\"_blank\" rel=\"noreferrer noopener\">phreakers<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>.<\/p>\n<p>For those of us old enough to remember\u00a0<a class=\"external\" href=\"https:\/\/www.webopedia.com\/TERM\/P\/POTS.html\" target=\"_blank\" rel=\"noreferrer noopener\">POTS<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>\u00a0lines, the squeal of a modem connection, and the feeling of connecting with a global community of people just like you.\u00a0 It&#8217;s hard to not say thank you because for me, someone who had their head buried in a computer form the age of eight I am not sure where I would be today without the opportunity I was provided to feed my obsession. In the 80s and 90s hackers, crackers, and phreaks where digital explorers, unlike many of the attacks discussed by other like the Olympic Games program which gave birth to Stuxnet, the Target hack, the Equifax hack, WannaCry, and other ransomware attacks, etc. Hackers, crackers, and phreaks like Kevin Mitnick and\u00a0<a class=\"external\" href=\"https:\/\/en.wikipedia.org\/wiki\/John_Draper\" target=\"_blank\" rel=\"noreferrer noopener\">Captain Crunch (John Draper)<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>\u00a0(Cap&#8217;n Crunch Whistle and the Secrets of the Little Blue Box, n.d.) were curious, they were not interested in monetary gain, they were not employed by a nation-state, this is why so many people like me sported\u00a0<a class=\"external\" href=\"https:\/\/pbs.twimg.com\/media\/DWH22VAVAAUq-Ek.jpg\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;Free Kevin&#8221; t-shirts<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>.<\/p>\n<p>Attacks have become far more intricate these days, the curiosity motivator in the context of the modern day attacker\/hacker seems almost non-existent, this is because the curious hackers can now hack legally, bug bounty programs are everywhere, with sites like\u00a0<a class=\"external\" href=\"https:\/\/www.hackerone.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">HackerOne<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>\u00a0listing pretty much every available bug bounty program. Since I started this post talking about United Airlines, I may as well end it with the story of\u00a0<a class=\"external\" href=\"https:\/\/www.zdnet.com\/article\/this-dutch-hacker-can-fly-a-million-miles-on-his-united-airlines-bug-bounty\/\" target=\"_blank\" rel=\"noreferrer noopener\">Oliver Beg<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>who earned a million miles via the\u00a0<a class=\"external\" href=\"https:\/\/www.united.com\/ual\/en\/us\/fly\/contact\/bugbounty.html\" target=\"_blank\" rel=\"noreferrer noopener\">United Airlines bug bounty program<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>.<\/p>\n<p>The world has changed significantly from the days when hackers, crackers, and phreaks were people I admired as the pioneers of a digital frontier to what we see today, organized crime syndicates and nation-states exploiting a connected world.<\/p>\n<p>When I think about the hackers of yesteryear I think about the pioneers of an industry I love, people like\u00a0<a class=\"external\" href=\"https:\/\/en.wikipedia.org\/wiki\/Gary_Kildall\" target=\"_blank\" rel=\"noreferrer noopener\">Barry Kildall<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>,\u00a0<a class=\"external\" href=\"https:\/\/en.wikipedia.org\/wiki\/Steve_Wozniak\" target=\"_blank\" rel=\"noreferrer noopener\">Steve Wozniak<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>,\u00a0<a class=\"external\" href=\"https:\/\/en.wikipedia.org\/wiki\/Dan_Bricklin\" target=\"_blank\" rel=\"noreferrer noopener\">Dan Bricklin<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>,\u00a0<a class=\"external\" href=\"https:\/\/en.wikipedia.org\/wiki\/Bob_Frankston\" target=\"_blank\" rel=\"noreferrer noopener\">Bob Frankston<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>,\u00a0<a class=\"external\" href=\"https:\/\/en.wikipedia.org\/wiki\/Richard_Stallman\" target=\"_blank\" rel=\"noreferrer noopener\">Richard Stallman<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>and many others who were pioneers in many cases exploited by those with differing motivations.\u00a0 The Kevin Mitnick&#8217;s and John Draper&#8217;s of the world represented those of us who didn&#8217;t like the\u00a0<a class=\"external\" href=\"http:\/\/arnosoftwaredev.blogspot.com\/2005\/08\/how-bill-gates-outmaneuvered-gary.html\" target=\"_blank\" rel=\"noreferrer noopener\">Gary Kildall, Digital Research, CP\/M and Bill Gates, Microsoft, DOS story<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>. (How Bill Gates Outmaneuvered Gary Kildall, 2005) While may think these days are over, they are not, what is different is that most of the Gary Kildalls today are Open Sourcing their code, this makes it much harder for the Bill Gates&#8217; of the world.\u00a0 Few people have heard of Scott Hansen, but he is the third founder of Google (well maybe the number two founder, but this is debatable), a book I recently read entitled\u00a0<a class=\"external\" href=\"https:\/\/www.amazon.com\/Valley-Genius-Uncensored-History-Founders\/dp\/1455559024\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;Valley of Genius&#8221;<span class=\"screenreader-only\">\u00a0(Links to an external site.)<\/span><span class=\"ui-icon ui-icon-extlink ui-icon-inline\" title=\"Links to an external site.\"><span class=\"screenreader-only\">Links to an external site.<\/span><\/span><\/a>\u00a0provides some great insight on some of the unsung heroes of Silicon Valley.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>References<\/strong><\/p>\n<p>Cap&#8217;n Crunch Whistle and the Secrets of the Little Blue Box. (n.d.). Retrieved October 4, 2018, from http:\/\/telephone-museum.org\/telephone-collections\/capn-crunch-bosun-whistle\/<\/p>\n<p>Great Rivalries in Cybersecurity: Tsutomu Shimomura vs. Kevin Mitnick. (n.d.). Retrieved October 4, 2018, from https:\/\/www.cybersecuritymastersdegree.org\/tsutomu-shimomura-vs-kevin-mitnick\/<\/p>\n<p>How Bill Gates Outmaneuvered Gary Kildall. (2005, August 18). Retrieved October 4, 2018, from http:\/\/arnosoftwaredev.blogspot.com\/2005\/08\/how-bill-gates-outmaneuvered-gary.html<\/p>\n<p>Shimomura, T. (2017, June 04). Catching Kevin. Retrieved October 4, 2018, from https:\/\/www.wired.com\/1996\/02\/catching\/<\/p>\n<p>Tung, L. (2016, August 09). This Dutch hacker can fly a million miles on his United Airlines bug bounty. Retrieved October 4, 2018, from https:\/\/www.zdnet.com\/article\/this-dutch-hacker-can-fly-a-million-miles-on-his-united-airlines-bug-bounty\/<\/p>\n<\/div>\n<div class=\"link_box\">\n<div class=\"clear\"><\/div>\n<\/div>\n<div class=\"subcontent\"><\/div>\n<\/div>\n<\/div>\n<div id=\"entry_45428\" class=\"discussion_entry communication_message can_be_marked_as_read read\" data-mark-read-url=\"\/api\/v1\/courses\/629\/discussion_topics\/7559\/entries\/45428\/read\">\n<div class=\"header clearfix\">\n<div class=\"header_title\">from\u00a0<a href=\"https:\/\/floridatech.instructure.com\/courses\/629\/discussion_topics\/7559?headless=1&amp;student_id=1302\">6.2 Discussion<\/a><\/div>\n<div class=\"teaser_message\"><\/div>\n<div class=\"post_date time_ago_date\" title=\"Oct 6, 2018 6:14pm\" data-timestamp=\"2018-10-06T18:14:03-04:00\">Oct 6, 2018 6:14pm<\/div>\n<div class=\"clear\"><\/div>\n<\/div>\n<div class=\"content\">\n<div><a class=\"avatar \" href=\"https:\/\/floridatech.instructure.com\/courses\/629\/users\/1302\"><span class=\"screenreader-only\">Richard Bocchinfuso<\/span><\/a><\/div>\n<div class=\"message user_content enhanced\">Interesting article on the North Korea cyber threat.<br \/>\nhttps:\/\/zd.net\/2yg0gSG<\/div>\n<div class=\"link_box\">\n<div class=\"clear\"><\/div>\n<\/div>\n<div class=\"subcontent\"><\/div>\n<\/div>\n<\/div>\n<div id=\"entry_46065\" class=\"discussion_entry communication_message can_be_marked_as_read read\" data-mark-read-url=\"\/api\/v1\/courses\/629\/discussion_topics\/7559\/entries\/46065\/read\">\n<div class=\"header clearfix\">\n<div class=\"header_title\">from\u00a0<a href=\"https:\/\/floridatech.instructure.com\/courses\/629\/discussion_topics\/7559?headless=1&amp;student_id=1302\">6.2 Discussion<\/a><\/div>\n<div class=\"teaser_message\"><\/div>\n<div class=\"post_date time_ago_date\" title=\"Oct 7, 2018 5:47pm\" data-timestamp=\"2018-10-07T17:47:14-04:00\">Oct 7, 2018 5:47pm<\/div>\n<div class=\"clear\"><\/div>\n<\/div>\n<div class=\"content\">\n<div><a class=\"avatar \" href=\"https:\/\/floridatech.instructure.com\/courses\/629\/users\/1302\"><span class=\"screenreader-only\">Richard Bocchinfuso<\/span><\/a><\/div>\n<div class=\"message user_content enhanced\">\n<p>Jonathan, interesting read, I had never heard of WANK, and I always enjoy learning something new. In the mid-90s I worked in big pharma as a Unix Sys Admin, I was a recent college grad, with this being my second job out of school, I used a Sun Microsystems IPC all-in-one workstation in college and Slackware Linux on my desktop, I spent all my time in Emacs and wrote all my paper with LaTeX. When I was hired by a pharmaceutical company with ~120K employees, I was given the reigns of the new Unix systems ranging from Sun Solaris, to DEC Tru64, to IBM AIX, to HP-UX, to SGI IRIX. It was amazing how many DEC and Mainframe people worked in IT in this massive company and how few Unix capable engineers there were, especially given that the plan was to replace a large DEC VMS footprint running on both DEC VAX and DEC Alpha machines. The organization (and the pharma industry back then) was so DEC centric they were deploying Windows NT 3.51 on DEC Alpha, it made total sense to everyone because of course, the developers of Windows NT were also the developers of VMS, the story was that WNT being the letters following VMS was not a coincidence. (Russinovich, 2018)<\/p>\n<p>I remember DECnet, CIQBA, FDDI, and our DEC email system (I think it was called Teamworks) all too well, I don&#8217;t miss these days. \ud83d\ude42 Ken Olsen could have owned the world, if he had just embraced the PC era and open computing, DEC tried to correct late in the game with the acquisition of Compaq, OpenVMS, and Digital Unix, but it was too late. I will say that the industry never really successful delivered something like VMS clustering, which just worked.<\/p>\n<p>BTW &#8211; I would argue that the term hacking originated in the 1990s. Gordon French held the first Homebrew Computer Club meeting in his garage in 1975; the attendees were all hackers (Love, 2013). John Draper (aka Captain Crunch) was hacking (phreaking) Ma Bell in the 60s and 70s, Ron Rosenbaum published an article in Esquire Magazin in October 1971 entitled &#8220;Secrets of the Little Blue Box&#8221; (Rosenbaum, 2011) where he talks about hacking the phone system and the hacker subculture.<\/p>\n<p><strong>References<\/strong><\/p>\n<p>Love, D. (2013, March 05). An Incredibly Important Tech Event Happened 38 Years Ago Today. Retrieved October 7, 2018, from https:\/\/www.businessinsider.com\/homebrew-computer-club-2013-3<\/p>\n<p>Rosenbaum, R. (2011, October 07). The Article That Inspired Steve Jobs: &#8220;Secrets of the Little Blue Box&#8221;. Retrieved October 7, 2018, from http:\/\/www.slate.com\/articles\/technology\/the_spectator\/2011\/10\/the_article_that_inspired_steve_jobs_secrets_of_the_little_blue_.html<\/p>\n<p>Russinovich, M. (2018, September 19). Windows NT and VMS: The Rest of the Story. Retrieved October 7, 2018, from https:\/\/www.itprotoday.com\/compute-engines\/windows-nt-and-vms-rest-story<\/p>\n<\/div>\n<div class=\"link_box\">\n<div class=\"clear\"><\/div>\n<\/div>\n<div class=\"subcontent\"><\/div>\n<\/div>\n<\/div>\n<div id=\"entry_46092\" class=\"discussion_entry communication_message can_be_marked_as_read read\" data-mark-read-url=\"\/api\/v1\/courses\/629\/discussion_topics\/7559\/entries\/46092\/read\">\n<div class=\"header clearfix\">\n<div class=\"header_title\">from\u00a0<a href=\"https:\/\/floridatech.instructure.com\/courses\/629\/discussion_topics\/7559?headless=1&amp;student_id=1302\">6.2 Discussion<\/a><\/div>\n<div class=\"teaser_message\"><\/div>\n<div class=\"post_date time_ago_date\" title=\"Oct 7, 2018 6:13pm\" data-timestamp=\"2018-10-07T18:13:07-04:00\">Oct 7, 2018 6:13pm<\/div>\n<div class=\"clear\"><\/div>\n<\/div>\n<div class=\"content\">\n<div><a class=\"avatar \" href=\"https:\/\/floridatech.instructure.com\/courses\/629\/users\/1302\"><span class=\"screenreader-only\">Richard Bocchinfuso<\/span><\/a><\/div>\n<div class=\"message user_content enhanced\">\n<p>Sergio, like most things in life, attacks or I should say successful exploitation can often be traced to human error. I think this is what makes social engineering so interesting, look around at the amount of data we, as a society are willing to volunteer online. Modern day culture and the rise of FOMO (Fear Of Missing Out) (Rivera, 2018) has created a fertile social engineering hunting ground for hackers, as our society moves closer to &#8220;The Truman Show&#8221;, we have the actors, those volunteering information, and the voyeurs, those who just watch, wait and manipulate. Our digital footprint makes us more vulnerable to attack; it can make us more or less likely to be hired, it can impact our creditworthiness, etc. I believe that we have no idea of the psychological impact of the experiment we are currently conducting, only time will tell, but as a Gen-Xer, a technologist and a parent I would be willing to take the bet that we will need to achieve better equilibrium because the trajectory we are currently on seems dangerous. (Walton, 2017) I guess my question here is, are we more afraid of the nation-state or the organized hacktivists like Anonymous or are we more afraid of the truly dangerous social engineers like Facebook who are trying to spread &#8220;emotional contagion&#8221;? (Kramer, Guillory, &amp; Hancock, 2014)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>References<\/strong><\/p>\n<p>Kramer, A. D., Guillory, J. E., &amp; Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 201320040.<\/p>\n<p>Rivera, J. (2018, August 04). The Rise of Fomo \u2013 Julia Rivera \u2013 Medium. Retrieved October 7, 2018, from https:\/\/medium.com\/@riverajulia0\/the-rise-of-fomo-4e9c2419b791<\/p>\n<p>Walton, A. G. (2017, October 03). 6 Ways Social Media Affects Our Mental Health. Retrieved October 7, 2018, from https:\/\/www.forbes.com\/sites\/alicegwalton\/2017\/06\/30\/a-run-down-of-social-medias-effects-on-our-mental-health\/#4367e3592e5a<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<h3><strong>Assignment<\/strong><\/h3>\n<div>[google-drive-embed url=&#8221;https:\/\/docs.google.com\/document\/d\/15-6dDS6hjhQyO5GuhkDHuqqEqavx6_o-3HrXSNoAdoI\/preview?usp=drivesdk&#8221; title=&#8221;Bocchinfuso_FIT-MGT5155-Week6_Paper_20181007&#8243; icon=&#8221;https:\/\/drive-thirdparty.googleusercontent.com\/16\/type\/application\/vnd.google-apps.document&#8221; width=&#8221;100%&#8221; height=&#8221;400&#8243; style=&#8221;embed&#8221;]<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The submissions for this assignment are posts in the assignment&#8217;s discussion. Below are the discussion posts for Richard Bocchinfuso, or you can\u00a0view the full discussion. from\u00a06.2 Discussion Oct 6, 2018 4:03pm Richard Bocchinfuso Dr. Perez and fellow classmates, first off I am incredibly tardy on this weeks post, my apologies. It&#8217;s Been a crazy week [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":37,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,14,2],"tags":[],"_links":{"self":[{"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/posts\/641"}],"collection":[{"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/comments?post=641"}],"version-history":[{"count":4,"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/posts\/641\/revisions"}],"predecessor-version":[{"id":699,"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/posts\/641\/revisions\/699"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/media\/37"}],"wp:attachment":[{"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/media?parent=641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/categories?post=641"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/tags?post=641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}