Security threats of Smart Device technologies (IoT)

Contributed by Justin Schomburg
Internet of thing security has become more and more prevalent and important in today’s day in age. IoT devices are getting smart and growing in number. This means that these devices will become prime target for hackers looking to use them massive botnet attacks like the Mirai botnet attack on Dyn and there will be increase number of hackers looking for back backdoor into your network and into your IoT devices. Challenges from over replicated unsecure devices to engineers lacks security responsibility can challenge the security integrity of these devices. The challenges can be mitigated with security techniques from both users and developers to secure you IoT devices.
This document is in PDF format. To view it click here.


Intrusion Detection and Prevention Systems Simplified

Contributed by Arthur J. Wyatt
This paper attempts to cover and discuss several aspects of Intrusion Prevention Systems and Intrusion Detection Systems. This paper attempts to do this is simple and basic language. Both systems are explained and defined according to the National Institute of Standards and Technology. Following that several techniques that can be used to install or implement them are described. The techniques described are hubs, port mirroring, test access points, and inline. During the discussion of each there are figures to depict and assisting in conveying how each implementation works. How each works along with the security or performance issues is discussed. The last thing talked about in this paper network segmentation and how Intrusion Prevention Systems and Intrusion Detection Systems could be used in conjunction to layer security and enforce network use and security policies.


Bring Your Own Devices: A Survey of BYOD Policies in the Workplace

Contributed by Billy Short
Bring Your Own Device policies are becoming more common.  Information Technology teams will have to ensure that they accommodate these growing movements.  This document will help teams understand how the BYOD policy will change their network infrastructure, why BYOD is the future of network infrastructure, and the risks and possible consequences of implementing BYOD in an enterprise organization. 
This document is in PDF format. To view it click here.


The Strengths and Limitations of DMZs in Network Security

Contributed by Cameron Meyer

A demilitarized zone (DMZ) in terms of a network is a segmented area in the network that is available to the public but is segmented in order to stay separated from a network’s internal private network. In other words, it separates the untrusted public Internet from the trusted network of an organization. This is done through the act of subnetting and is a useful network security design feature within the network architecture.

This document is in PDF format. To view it click here.


Security Concerns of Wearable Technology

Contributed by Mansur Abdulraheem

Wearable technology has grown extremely popular. From smartwatches to glasses, there are a variety of wearables that are now available to consumers for various purposes. Most consumers purchase these devices for ease of data access. Smartwatches may be used to avoid having to pull out their phone to collect basic information such as the weather forecast or to quickly read a text message or calendar reminder. Activity trackers help one improve on their workout and assist in tracking performance over time. Smart glasses allow us to better document our trips and experiences to help share with friends and family. So what happens to the data collected by wearables?

This document is in PDF format. To view it click here.


Subscribe to RSS - Sistema