Red Tape

Tue
16
Jun

Best Practices to Minimize Risks for Online Gaming

Contributed by Emily Walters.

Online gaming is a market that is growing as more multiplayer, internet based games are released. With this growing market comes a growing risk for the consumers. While games are being given more features that are unique, it is opening up possibilities for security risks. It is the people who play video games responsibility to stay informed, be aware, do research, and comply with a benevolent gaming social experience. Unfortunately, not all gamers want to have a safe and fun environment for all to enjoy. Some of these people want to create problems for the companies providing the gaming service, or people who enjoy the game. So, what practices can gamers use to minimize security risks for online gaming?

Tue
26
May

The Information Security Management System in Healthcare Computer Networks

Contributed by Ming-Li Tabor

Sony Pictures Entertainment got cyber attacked and was requested to cancel the film, The Interview. The security of the network was vulnerable to the attack. In the health care sector, patients’ medical and personal information are electronic records, which are vulnerable to hackers. The purpose of research is to increase the awareness and translate the importance of information security. The organizations of health care should ensure the confidentiality, integrity, and availability of the health care personal information. The information security management system includes policies which are related to information security and risks. The contents include security management and risk assessment, security controls, plans, and procedures, physical security, human factors security, security auditing, and computer security models.

Tue
26
May

Awareness of BYOD Security Concerns

Contributed by Benjamin Tillett-Wakeley

Wed
13
May

An Inquiry into Privacy Concerns: Memex, the Deep Web, and Sex Trafficking

Contributed by Jeffery Hammonds

This research study will examine how large scale data mining may negatively affect privacy as it helps solve national and international sex trafficking crimes. The data mining tool researched here is the Memex Project; created, implemented, and managed by the United States Defense Advanced Research Projects Agency (DARPA). The Memex Project senses patterns in large amounts of data and makes connections. Memex was created to assist the federal government in cracking down on human trafficking. It may also be used by national governments in the fight against terrorism in the near future. While the Memex Project’s purpose is admirable, it could be used as a tool to intrude on the privacy of law-abiding citizens. As part of this research study, a breakdown of how data mining is defined and regulated by United States law will also be examined.

Pages

Subscribe to RSS - Red Tape