Et Cetera

Wed
20
Jul

Introduction to Cisco Firepower Threat Defense

Contributed by Jeff Dixon

Information Security is akin to a never ending cat and mouse game, it’s rapid pace makes it one of the fastest evolving areas in technology. Every day, new vulnerabilities and new solutions are created. This paper will discuss Cisco’s Next Generation Firewall technology that has evolved to help defend against new and emerging threats. While many solutions exist, the focus for this paper will be on Cisco’s newest unified Firepower Threat Defense (FTD) image running on their Adaptive Security Appliance (ASA).

This document is in PDF format. To view it click here.

Thu
14
Jul

Fog Computing and the Internet of Things

Contributed by Albert Dominguez V

Mon
27
Jun

Geo-fencing Technologies and Security

Contributed by William Jason Haddock

The author explains geo-fencing and how it works and its applications in the real world, including how they pertain to information security and also elaborates the strengths, weaknesses, opportunities, and threats associated. The author includes more information about implementing a geo-fence within a wireless network and the methodology used to contain, fingerprint, and allow mobility of secure data across a network. Geo-fencing is shaping our world and information security professionals need to develop strategies for it in regard to information assurance.

This document is in PDF format. To view it click here.

Mon
27
Jun

Rise of Robotics

Contributed by Demonte Harris

Security, a key aspect of assuring that important things are kept safe, is evolving daily. According to the National Information Systems Security Glossary, information security is defined as “the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats” (University). The question is, to what extent is too far when it comes to the privacy of the individuals who need this information to be protected?

This document is in PDF format. To view it click here.

Fri
17
Jun

Are Internet of Things Safe and Secure

Contributed by Carl Brackett

As technology advances, so do the security risks involved. In the last couple of years, a new term has been introduced to society called “Internet of Things”. This term can be used for any type of device that now connects to the Internet (Sasso, 2015). The question is how secure are these devices for consumers to be using?

This paper is going to be researching whether these devices are safe for consumers to be using in their businesses or homes. There will be several examples discussed of different devices out on the market that may or may not be secure in their usage. In determining whether these devices are secure or not, this research will look into how information obtained by these devices are or are not being kept private from the rest of the world.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera