Monday, February 6, 2017
Posted by manager
Reader's rate:
0
Contributed by Anthony Ralston This paper will focus on understanding the risk associated with phishing attacks on companies and how we can measure growth through phish benchmarking. The paper will define and look at the different angles that phishes can exploit users and how we can measure... + continue reading
Monday, February 6, 2017
Posted by manager
Reader's rate:
0
Written by Scott N. Schober Hacked Again is a book about an introduction to information security and key terms or phrases used in the industry. Each chapter covers a different aspect of Information Security which includes a definition and a few examples to clarify. Scott, the author, clearly... + continue reading
Friday, January 27, 2017
Posted by manager
Reader's rate:
0
Contributed by Ann Funk Everyone in this day and age interacts with a computer in some form or another. These computers can take the form of ATM’s, Gas Pumps, laptops, and even watches. The one thing they all have in common is that they store or access our personal data. In this paper, we will... + continue reading
Thursday, January 26, 2017
Posted by manager
Reader's rate:
0
Contributed by Billy Short Internet Protocol telephony (frequently referred to as IP telephony) is an important concept in enterprise communications technology. IP telephony refers to all real-time applications over IP, which include many different instant messaging programs, video-... + continue reading
Thursday, January 19, 2017
Posted by manager
Reader's rate:
0
Contributed by A. Michele Parrish As more devices are connected to the Internet there is an increased demand for more resources that must be provisioned rapidly. In traditional networking, a network was designed for a long period of time; the engineers thought about the clients, the servers and... + continue reading

Home Page

Featured Articles

Monday, 06/02/17 - 0 comment(s)
Contributed by Anthony Ralston This paper will focus on understanding the risk associated with phishing attacks on companies and how we can measure growth through phish benchmarking. The paper will define and look at the different angles that phishes can exploit users and how we can measure their effectiveness. The paper will look at the... + continue reading
Monday, 06/02/17 - 0 comment(s)
Written by Scott N. Schober Hacked Again is a book about an introduction to information security and key terms or phrases used in the industry. Each chapter covers a different aspect of Information Security which includes a definition and a few examples to clarify. Scott, the author, clearly has a lot of experience in the industry and relays... + continue reading

Red Tape

Tuesday, 09/08/16 - 0 comment(s)
Contributed by Lamaris Davis The responsibility of risk management in healthcare systems falls on multiple individuals within any given organization. It’s well known that most hospitals and... + continue reading

Cryptography

Monday, 22/08/16 - 0 comment(s)
Contributed by Aelphaeis Mangarae Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often... + continue reading

Exploitation

Monday, 22/08/16 - 0 comment(s)
Contributed by Shynlie Simmons This paper focuses on hacking techniques of web applications and how the implementation of security through programming can keep intruders from wreaking havoc on... + continue reading

Et Cetera

Monday, 06/02/17 - 0 comment(s)
Contributed by Anthony Ralston This paper will focus on understanding the risk associated with phishing attacks on companies and how we can measure growth through phish benchmarking. The paper... + continue reading

Recommended Reading

Monday, 06/02/17 - 0 comment(s)
Written by Scott N. Schober Hacked Again is a book about an introduction to information security and key terms or phrases used in the industry. Each chapter covers a different aspect of... + continue reading