Et Cetera

Mon
27
Jun

Geo-fencing Technologies and Security

Contributed by William Jason Haddock

The author explains geo-fencing and how it works and its applications in the real world, including how they pertain to information security and also elaborates the strengths, weaknesses, opportunities, and threats associated. The author includes more information about implementing a geo-fence within a wireless network and the methodology used to contain, fingerprint, and allow mobility of secure data across a network. Geo-fencing is shaping our world and information security professionals need to develop strategies for it in regard to information assurance.

This document is in PDF format. To view it click here.

Mon
27
Jun

Rise of Robotics

Contributed by Demonte Harris

Security, a key aspect of assuring that important things are kept safe, is evolving daily. According to the National Information Systems Security Glossary, information security is defined as “the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats” (University). The question is, to what extent is too far when it comes to the privacy of the individuals who need this information to be protected?

This document is in PDF format. To view it click here.

Fri
17
Jun

Are Internet of Things Safe and Secure

Contributed by Carl Brackett

As technology advances, so do the security risks involved. In the last couple of years, a new term has been introduced to society called “Internet of Things”. This term can be used for any type of device that now connects to the Internet (Sasso, 2015). The question is how secure are these devices for consumers to be using?

This paper is going to be researching whether these devices are safe for consumers to be using in their businesses or homes. There will be several examples discussed of different devices out on the market that may or may not be secure in their usage. In determining whether these devices are secure or not, this research will look into how information obtained by these devices are or are not being kept private from the rest of the world.

This document is in PDF format. To view it click here.

Fri
10
Jun

A Diamond in the Rough

Contributed by Taylor Broach

Auto markets today are flooded with new cars equipped with features harnessing cutting edge technology. Tesla Motors leads this wave of technologically advanced cars; however, their cars not only boast the best features but they offer security in their products like none other. Many other auto makers have joined the smart car revolution and displayed various attempts at a marriage of technology and the driver. Jeep has struggled greatly with their vehicle intelligence features because they have been shown to have various security vulnerabilities and dangers. Tesla offers a refined, secure and reasonably priced electric platform for drivers to feel safe carrying their families in.

This document is in PDF format. To view it click here.

Thu
09
Jun

Hacking: What Video Gamers Love to Hate

Contributed by Matthew Cantu

This paper explains the effects hacking has on the video game industry. The paper also goes into great detail about why these hackers have become so apparent the last decade as games have become more sophisticated. The video game industry is taking a major hit each and every year and must battle everyday against these hackers to preserve, not only their game, but also their reputation. As you begin to look further into the paper you’ll discover how these companies have begun to counteract some of these hackers. Some of the hackers may be easier than others to deal with. Some are just small time hobbyists, others are large hacktivist groups looking to deal major damage.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera