Et Cetera

Thu
29
Nov

Network Security for the Small-Medium Business

Contributed by Anthony Mercer

Sun
11
Nov

BYOD Security Considerations in a College Environment

Contributed by Gregory Boykin

Sun
11
Nov

Managing Electronic Patient Health Information in a Nationwide Health Information Network

Contributed by John Branner
A lack of access to medical records can cause delays and put patient health at risk. Since 2004, the U.S. government has been working toward developing a nationwide health information network (NHIN or NwHIN) to bridge the health care information gap between geographic locations and create a “network within networks.” However, problems associated with the development of the NHIN have been noted early in the development process. Patient information security, accessibility, interoperability, and data standardization have been at the forefront of concern. This paper addresses those concerns and provides a framework for managing a nationwide patient information network.
 
 
 
This document is in PDF format. To view it click here.

Sat
27
Oct

The Safety of End-User Data in the Cloud

Contributed by Rocky Goins
Data security is a serious issue in cloud computing because of the location of use data in different places across the world. This paper will discuss the security and privacy of end user data in cloud computing. The paper will delve into the details of data protection measures used to ensure maximum data protection while reducing the risks to user data. This research paper will also compare existing research on the techniques and approaches used to secure user data on cloud platforms.
 
This document is in PDF format. To view it click here.

Sun
30
Sep

Is my Network Secure?

Contributed by Vinay Sawant

and Information Security administrator, Network and Information Security Manager, and Chief Information Security Officer (CISO) will have. This research paper discusses about various Computers and Networking related security threats and vulnerabilities in enterprise network. We also discuss about traditional security threats, latest security threats and makes a list of all the security related threats and discuss suggested mitigation methods. A detailed analysis of network security appliances, software, and management products will be presented so that reader can choose best solution for their network. Some common security implementation mistakes are also analyzed in this paper. Finally, we are discussing about network security audits and importance of up to date security patches.

 
This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera