Et Cetera

Mon
22
Apr

Guns for Hire: An Exploration of Booter Services

Contributed by Sam Dixon

Fri
19
Apr

Block Chain and DNS: Improving Security

Contributed by Abraham Flores
DNS technology acts as the backbone of the internet but suffers from serious vulnerabilities that have been used in major attacks. These attacks include the Mirai botnet DDoS attack on DYN’s DNS services, and the BGP/DNS poisoning of Amazon’s route 53 service. By using blockchain technology as an underlying mechanism, DNS could have improved integrity and security, and using the peer-to-peer network, complete decentralization. There are already technologies providing DNS-like services using blockchain and can be looked to for an example of implementing DNS on a blockchain-based network.
 
This document is in PDF format. To view it click here.

Tue
26
Mar

Cloud Security - Challenges and best practices

Contributed by Safwan Riyazudeen Paul Sirajudeen
The quest to access data effectively and efficiently has brought forth the birth of cloud computing technology.  The cloud computing industry is experiencing hyper-growth recently in the technology community.  It is difficult to imagine an enterprise without the usage of cloud services due to its low cost of ownership and maintenance.  This article provides an overview on some of the challenges faced by technology community using cloud services and some of the best practices that can be adapted to address them.
 
 
This document is in PDF format. To view it click here.

Sun
10
Mar

Fundamentals of Network Segmentation

Contributed by Arthur Wyatt

Mon
04
Mar

Internet of Things (IoT) Security on Consumer Devices

Contributed by Mark E. Turner
In the past 5 years, the Internet of Things (IoT) has exploded onto the computing world and changed markets with it.  No market has been changed more than the consumer market.  As a result, consumers have enjoyed huge improvements to their everyday lives.  While IoT has provided many benefits, it has also brought many challenges with it.  The most significant of these challenges is how these devices have impacted consumer network security.
 
 
This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera