Et Cetera

Mon
28
Dec

The Internet of Things (IoT) – Removing the Human Element

Contributed by Robert Martin

This paper focuses on the IT security challenges facing the Internet of Things (IoT). An isaca.org article describes the Internet of Things as, “a scenario in which objects, animals or people are provided with unique identifiers and the ability to automatically transfer data over a network without requiring human-to-human or human-to-computer interaction” (Gonzalez & Djurica, 2015). Additionally, this paper outlines the security risks and impacts associated with removing human intervention from the Internet of Things. The four components of the Internet of Things discussed in this paper are the “things” themselves, the data, the communication network, and the computing systems. The purpose of this paper is to show the underlying security risks associated with interconnecting people, data, and devices via the Internet, without human controls.

Wed
09
Dec

Mobile Malware in the Enterprise

Contributed by Stephen Garrett Allen

Tue
08
Dec

Intrusion Detection from Simple to Cloud

Contributed by David Mitchell

Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection have improved over time in order to keep up with the hackers. The advancement in technology and Internet speeds have contribute to improved intrusion detection systems. The challenges today are these advancements have move more and more companies to virtualization in a cloud environment. This new environment has created some challenges for intrusion detection and protection systems. Intrusion detection system developers realize the challenges for intrusion detection in the cloud environment so they are beginning to improve the systems to protect this environment. Companies have been concern with cloud security as they move more and more data to a cloud environment.

This document is in PDF format. To view it click here.

Mon
07
Dec

Are Hospital Networks Really Secure

Contributed by Carl Brackett

Medical care comes in various forms of treatment; they have one thing in common no matter which medical facility in which treatment was obtained, they all start a patient record. Patient records are no longer recorded on paper; they are stored in a digital format. The question is, do medical facilities like hospitals really have their networks secure to protect patients and their confidential information?

This document is in PDF format. To view it click here.

Tue
01
Dec

BYOD-Impact on Healthcare Information Security

Contributed by Brian Kyle Marek

Pages

Subscribe to RSS - Et Cetera