Et Cetera

Thu
28
Jun

Blockchain in Finance

Contributed by Lisa Barrett
Recently, in technology and financial circles everyone has been talking about blockchain. In 2016 IBM theorized that in four years 66% of banks is expected to have blockchain in some form of commercial production (Shen 2016). The National Business Review describes blockchain as “a distributed database that maintains a continuously growing list of ordered records, called “blocks’”. IBM takes it a step further to describe blockchain as a shared, distributed ledger that facilitates the process of recording transactions and tracking assets in a business network (Gupta, M 2017). This paper will discuss the use of blockchain in the financial industry, how it compares to current day processes companies and banks conduct transactions and store data without blockchain.
 
This document is in PDF format. To view it click here.

Sun
18
Mar

Designing a Network with Segmentation

Contributed by Timothy Buns
 

Sun
18
Mar

From MPLS to Software-Defined Wide Area Network

Contributed by David Mitchell

Tue
16
May

Smart Home Technology and Vulnerabilities

Contributed by Kelly Gould

In today’s homes, it is not unusual to see various devices connected to the internet intended to make our daily lives easier. These devices can oversee anything from keeping our homes at the proper temperature, to watering our garden, to giving us our daily news briefing, to locking our doors at night. While these devices are intended to make our lives easier, they can also cause a potential headache if the wrong people gain access. This paper will go over what smart home technology is and how it is used, various devices currently on the market, current vulnerabilities that have been found and used by hackers, and the current legal status pertaining to what is considered personal information and evidence regarding smart devices.

This document is in PDF format. To view it click here.

Thu
11
May

Internet of Things (IoT) Attacks

Contributed by Victoria Ellsworth

The Internet of Things (IoT) is based off a larger concept; the Internet of Things came from idea of the Internet of Everything. The Internet of Everything (IoE) is the idea of bringing together people, process data and things. The Internet of Everything is important because it allows us to make network connections between things that were never possible, creating a more enriching, relevant and new opportunities. The Internet of Things has allowed us to provide more physical objects connected to the internet. The growth in IoT technologies in such a short amount of time is significant and will be an important factor in knowing how to protect an organization, community and your own personal data. Understanding reasoning for IoT attacks and the preliminary measures needed protect asset will give you a better understanding and knowledge in the growing world of technology.

Pages

Subscribe to RSS - Et Cetera