Et Cetera

Fri
21
Apr

Advantages and Drawbacks to Using Biometric Authentication

Contributed by Stuart Hall

As technology advances, so must the means of heightened information security. Corporate businesses, hospitals and your regular everyday people are relying more and more on technology for conducting business, transferring medical records, on-line banking and other everyday activities such as social medial. As the need for stronger information security arises new technology and means of authentication have been created. Multifactor authentication is a means of authenticating an individual using several different forms of authentication. Some use the term three-factor authentication. Three-factor authentication falls into these categories knowledge, possession, and inherence (Haughn, 2014). I consider this as something you know, something you have and something you are.

This document is in PDF format. To view it click here.

Tue
18
Apr

Open Stack & Open Source Software Vulnerabilities

Contributed by Maxton Richardson

Open Stack is an open source software technology that’s changing and developing the way we do business, but many are unaware of Open Stack technology. According to Business Wire, “The World Runs on Open Stack”. Open Stack is “Backed by some of the biggest companies in software development”. There are “Thousands of individual community members who support the growth, maintenance, & development of Open Stack. Many big industries utilize Open Stack such as the Auto-Industry, media, finance, commerce, telecom, and energy. People all over the world use Open Stack daily, but very seldom people are aware of Open Stack technology. As stated by Opensource.com, “many think that Open Stack is the future of cloud computing.”

This document is in PDF format. To view it click here.

Wed
05
Apr

BITCOIN BASICS: Bitcoin Miners and their Role in Bitcoin’s Future

Contributed by Steve Ingram

This paper covers some basics of Bitcoin and some of the issues and concerns that many raise about the role Bitcoin miners will play in the future of Bitcoin. Since the inception of Bitcoin in 2009, acceptance of the protocol has grown but there are many questions that must be answered. After doing research on this topic, I have a better understanding of the Bitcoin protocol, but, I still have doubts that it will be universally excepted in the future. Bitcoin mining could be a major factor in its success. This paper is not meant to promote or criticize Bitcoin, but challenge the reader on the concept of Bitcoin mining as a viable solution for validating bitcoin transactions into the ledger system. These questions must be addressed if Bitcoin is to survive in the 21st century.

This document is in PDF format. To view it click here.

Mon
06
Feb

Understanding Phishing and Protecting the 8th Layer

Contributed by Anthony Ralston

This paper will focus on understanding the risk associated with phishing attacks on companies and how we can measure growth through phish benchmarking. The paper will define and look at the different angles that phishes can exploit users and how we can measure their effectiveness. The paper will look at the traditional measurements matrix based on clicks and credential harvesting. Moreover, this paper will look at cultural, quality of phish, work environment, and other factors to establish a larger picture of the risk to a company from phishing attacks. It is hoped that this paper will serve as a closer consideration what it takes to measure and protect users from phishing attacks.

This document is in PDF format. To view it click here.

Fri
27
Jan

Securing Access Using Different Types of User Authentication

Contributed by Ann Funk

Everyone in this day and age interacts with a computer in some form or another. These computers can take the form of ATM’s, Gas Pumps, laptops, and even watches. The one thing they all have in common is that they store or access our personal data. In this paper, we will discuss the ways that this data is secured by the use of User Authentication. We will begin by talking a little about the different types of user authentication and how it is used. Giving a little insight into the positives of each method and even giving some information about the challenges of each method allowing the user to decide exactly which method is right for them.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera