Et Cetera


Enterprise Network Management

Contributed by Billy Short

This document was created for the implementation of best practices in enterprise network management. Specifically, best practices in security are emphasized. Best practices in an enterprise network are used by Network Administrators and Information Technology management in order to consistently create highly functional, yet highly secure networks. Secure networks are key in providing clients, customers, and employee's data and other files safe and secure. While reading and understanding this report, individuals will learn that the level of security and the level of usability by the user is directly affected. A network can be extremely secure, but impractical to use.

This document is in PDF format. To view it click here.


Impact of Network Security Vulnerability Managment

Contributed by Robert Underwood

Managing cyber security vulnerabilities in a large network is a big challenge where the implementation of cyber security techniques can create network slowdowns that negatively impact customers and the delivery of service. The challenge of managing cyber security for a large network is monumental because of the complexity of cyber security associated with multifaceted and interrelated systems to which data, voice, and video may be imbedded. Since all computers in the network are interconnected and their cyber security is independent the total effort required for the entire network the effort to manage cyber security becomes multiplied by a colossal scale.

This document is in PDF format. To view it click here.


Biometric Security Now And In The Future

Contributed by Justice E. Thurman


Locky: The New Face of Ransomware

Contributed by Jeanna Long

Those of us in the Information Technology (IT) field all know what ransomware is. It is a type of malicious software that blocks access to a computer or computer system and demands payment, “ransom”, to have access to the computer system again. Over the years, ransomware has evolved and become more malicious.

This document is in PDF format. To view it click here.


Implementing Effective Security Techniques Using Best Practices in Networking Management

Contributed by Larry Lee Jackson Jr.


Subscribe to RSS - Et Cetera