Sistema

Tue
28
Feb

Best practices for firewall configuration and maintenance in higher education

Contributed by Wendell Collie Jr.

This paper's purpose is to investigate best practices for firewall configuration and maintenance in higher education. It seeks to aid these learning institutions by providing an in-depth analysis of firewalls. In particular, this study will have compared various types of firewall technologies along with its features.

This document is in PDF format. To view it click here.

Thu
26
Jan

IP Telephony: Private Branch Exchange(PBX) vs. VoIP

Contributed by Billy Short

Internet Protocol telephony (frequently referred to as IP telephony) is an important concept in enterprise communications technology. IP telephony refers to all real-time applications over IP, which include many different instant messaging programs, video-conferencing, fax services, and Voice over Internet Protocol (VoIP). This document will focus mostly on the VoIP aspect of IP telephony.

This document is in PDF format. To view it click here.

Thu
19
Jan

Bring Your Own Device (BYOD), Best Practices in a Business Environment

Contributed by James S. McKinney

Bring Your Own Device (BYOD) is a trending business strategy that allows employees to utilize up-to-date electronic devices that they are already comfortable with. Employers benefit from increased employee satisfaction and the reduced cost of providing and maintaining electronic devices. The application of Best Practices can help a business to profit from the BYOD approach while managing the risk. Mitigating the risks associated with BYOD such as increased potential for data leakage and the exploitation of vulnerabilities introduces a host of challenges for the Information Assurance (IA) department. Establishing an acceptable device list that identifies allowed platforms and IOS versions serves to manage the diversity of end points and minimizes threats associated with outdated software. In addition a Network Access Control (NAC) should be implemented to authenticate users and validate device security.

Thu
19
Jan

The Introduction of Internet Protocol Version 6 (IPv6) Implementation in North Carolina Public Universities in Response to the Digital Millennium Act of 1998

Contributed by Lemuel T Mattocks

IPv4, as the driving force of the Internet, has reached its limit. The American Registry for Internet Numbers (ARIN) depleted its free address space on September 24th, 2015. (American Registry for Internet Numbers, 2015). Any new address requests must be made to facilitate the transition to IPv6. The idea of depletion is not new. The Request for Comments has been around for nearly twenty years. (Internet Task Engineering Force, 1998) Various factors have led to the delay of mass IPv6 deployment but the role of the Digital Millennium Copyright Act is usually not mentioned. Resolving these problems will hasten the transition to IPv6. The current IPv6 deployment currently stands at just over 15% as of November 2016. (Google, 2016) A seamless transition will depend on a much more rapid response considering the lack of IPv4 addresses.

Mon
22
Aug

Forensically Unrecoverable Hard Drive Data Destruction

Contributed by Daniel G. James

You have probably heard someone make the statement, “once it is has been deleted it is gone forever!” This statement is simply just not true. Deleted files can actually be recovered if effort to do so is made shortly after deletion. Another common misconception is that formatting a data storage device will erase all data beyond recovery. This scenario is also not true. It is possible to restore partition tables on a drive and recover the entire contents! So, how can anyone be sure their data has been destroyed beyond recovery? The solution is overwriting the data with random or consecutive patterns. This can be done with a number of freeware and retail products.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Sistema