Et Cetera

Tue
26
Mar

Cloud Security - Challenges and best practices

Contributed by Safwan Riyazudeen Paul Sirajudeen
The quest to access data effectively and efficiently has brought forth the birth of cloud computing technology.  The cloud computing industry is experiencing hyper-growth recently in the technology community.  It is difficult to imagine an enterprise without the usage of cloud services due to its low cost of ownership and maintenance.  This article provides an overview on some of the challenges faced by technology community using cloud services and some of the best practices that can be adapted to address them.
 
 
This document is in PDF format. To view it click here.

Sun
10
Mar

Fundamentals of Network Segmentation

Contributed by Arthur Wyatt

Mon
04
Mar

Internet of Things (IoT) Security on Consumer Devices

Contributed by Mark E. Turner
In the past 5 years, the Internet of Things (IoT) has exploded onto the computing world and changed markets with it.  No market has been changed more than the consumer market.  As a result, consumers have enjoyed huge improvements to their everyday lives.  While IoT has provided many benefits, it has also brought many challenges with it.  The most significant of these challenges is how these devices have impacted consumer network security.
 
 
This document is in PDF format. To view it click here.

Fri
28
Dec

Digital Social Engineering Attacks

Contributed by Christopher Hovis
This paper will look at how social engineers exploit human vulnerabilities through digital social engineering attacks and how those attacks can affect the confidentiality, integrity, and accessibility of information and computer systems. Social engineering attacks are propagated by malicious links, spoofing websites, SMS text, or pop-up windows that ask for sensitive information or infect the target’s computer with malware for use in a later attack. This paper will define the types of human vulnerabilities that are exploited during a social engineering attack and define and discuss the most used attack techniques that are carried out by social engineers in the attempt to collect a target’s information, gain access to their systems, or prevent them from accessing their systems or devices.
This document is in PDF format. To view it click here.
 
 
 

Sun
09
Dec

HIPAA Rules and Current Threats for EHR’s

Contributed by David McDaniel

Pages

Subscribe to RSS - Et Cetera