Author

 Barbara Johnson
LinkedIn
RSS
E-Mail

Profile of Barbara Johnson

Senior Lead Certification Instructor & Courseware Developer, The Training Camp
Member Since: 12/12/2015
Author
News & Commentary Posts: 1
Comments: 1

Barbara Johnson is an authorized senior and lead certification instructor and courseware developer for The Training Camp, International Information Systems Security Certification Consortium (ISC)² and The Business Continuity Institute and is chairman of (ISC)² Common Body of Knowledge (CBK) Committee.

Barbara also provides information security and business continuity management consulting services to U.S. government agencies, defense contractors, entertainment, finance, healthcare, technology and travel information services. Her expertise includes developing governance and designing risk-based controls to protect corporate proprietary, personal privacy, and government information from fraud, misuse, intrusion and interruption. She strategizes enterprise-wide security architectures, establishes information protection and business continuity programs, devises information security policies, standardizes technologies and processes, and creates relevant education, training and awareness workshops and collateral.

Her risk and control frameworks include ISO 27001, COBIT, NIST SP 800-53, HIPAA-HITECH and PCI. Barbara's credentials include: BSIE (IIT), MBA (LMU), CISSP, ISSMP, CISA, CBCP, CBCI and MBCI.

Articles by Barbara Johnson
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: In Russia, application hangs YOU!
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17177
PUBLISHED: 2018-09-18
An issue was discovered on Neato Botvac Connected 2.2.0 and Botvac 85 1.2.1 devices. Static encryption is used for the copying of so-called "black box" logs (event logs and core dumps) to a USB stick. These logs are RC4-encrypted with a 9-character password of *^JEd4W!I that is obfuscated ...
CVE-2018-17178
PUBLISHED: 2018-09-18
An issue was discovered on Neato Botvac Connected 2.2.0 devices. They execute unauthenticated manual drive commands (sent to /bin/webserver on port 8081) if they already have an active session. Commands like forward, back, arc-left, arc-right, pivot-left, and pivot-right are executed even though the...
CVE-2018-11869
PUBLISHED: 2018-09-18
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of length validation check for value received from firmware can lead to buffer overflow in WMA handler.
CVE-2018-17176
PUBLISHED: 2018-09-18
A replay issue was discovered on Neato Botvac Connected 2.2.0 devices. Manual control mode requires authentication, but once recorded, the authentication (always transmitted in cleartext) can be replayed to /bin/webserver on port 8081. There are no nonces, and timestamps are not checked at all.
CVE-2018-11852
PUBLISHED: 2018-09-18
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, improper check In the WMA API for the inputs received from the firmware and then fills the same to the host structure will lead to OOB write.