Et Cetera

Mon
06
Feb

Understanding Phishing and Protecting the 8th Layer

Contributed by Anthony Ralston

This paper will focus on understanding the risk associated with phishing attacks on companies and how we can measure growth through phish benchmarking. The paper will define and look at the different angles that phishes can exploit users and how we can measure their effectiveness. The paper will look at the traditional measurements matrix based on clicks and credential harvesting. Moreover, this paper will look at cultural, quality of phish, work environment, and other factors to establish a larger picture of the risk to a company from phishing attacks. It is hoped that this paper will serve as a closer consideration what it takes to measure and protect users from phishing attacks.

This document is in PDF format. To view it click here.

Fri
27
Jan

Securing Access Using Different Types of User Authentication

Contributed by Ann Funk

Everyone in this day and age interacts with a computer in some form or another. These computers can take the form of ATM’s, Gas Pumps, laptops, and even watches. The one thing they all have in common is that they store or access our personal data. In this paper, we will discuss the ways that this data is secured by the use of User Authentication. We will begin by talking a little about the different types of user authentication and how it is used. Giving a little insight into the positives of each method and even giving some information about the challenges of each method allowing the user to decide exactly which method is right for them.

This document is in PDF format. To view it click here.

Thu
19
Jan

Software Defined Networks: What Is It and Why Do We Need It?

Contributed by A. Michele Parrish

Tue
18
Oct

Common Types of Recent Phishing Emails to Look out For

Contributed by David Balaban

The present-day cybercriminals often opt for social engineering to achieve their malevolent goals. The reason is obvious – it turns out that manipulating humans is just as effective as exploiting code vulnerabilities to hack into computer systems. Plus, it’s a no-brainer. All it takes is tailoring a trustworthy-looking email and sending it out to as many users as possible. By opening the attached files or clicking on embedded links, gullible recipients run the risk of catching viruses or exposing their online identity to theft.

This document is in PDF format. To view it click here.

Thu
15
Sep

A Review of Cloud Computing

Contributed by Hope Roskelly

Cloud computing offers many benefits to companies. These benefits come at a cost. There are many security threats and vulnerabilities that come along with utilizing cloud computing. However, there are preventative measures that companies can do to protect themselves from these threats and vulnerabilities. There are many pros and concerns that businesses have with cloud computing. Some of these threats and concerns will be remedied through the next few years as the market pushes weak cloud providers out and the big players buy up other cloud providers.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera