Sistema

Thu
19
Jan

The Introduction of Internet Protocol Version 6 (IPv6) Implementation in North Carolina Public Universities in Response to the Digital Millennium Act of 1998

Contributed by Lemuel T Mattocks

IPv4, as the driving force of the Internet, has reached its limit. The American Registry for Internet Numbers (ARIN) depleted its free address space on September 24th, 2015. (American Registry for Internet Numbers, 2015). Any new address requests must be made to facilitate the transition to IPv6. The idea of depletion is not new. The Request for Comments has been around for nearly twenty years. (Internet Task Engineering Force, 1998) Various factors have led to the delay of mass IPv6 deployment but the role of the Digital Millennium Copyright Act is usually not mentioned. Resolving these problems will hasten the transition to IPv6. The current IPv6 deployment currently stands at just over 15% as of November 2016. (Google, 2016) A seamless transition will depend on a much more rapid response considering the lack of IPv4 addresses.

Mon
22
Aug

Forensically Unrecoverable Hard Drive Data Destruction

Contributed by Daniel G. James

You have probably heard someone make the statement, “once it is has been deleted it is gone forever!” This statement is simply just not true. Deleted files can actually be recovered if effort to do so is made shortly after deletion. Another common misconception is that formatting a data storage device will erase all data beyond recovery. This scenario is also not true. It is possible to restore partition tables on a drive and recover the entire contents! So, how can anyone be sure their data has been destroyed beyond recovery? The solution is overwriting the data with random or consecutive patterns. This can be done with a number of freeware and retail products.

This document is in PDF format. To view it click here.

Mon
08
Aug

Fog Computing

Contributed by Billy Short

During my studies here at East Carolina University, I have studied and read about many different t types of emerging technologies. For this writing, I will be focusing on fog computing. Before this report, I had only heard of fog computing mentioned occasionally during various courses. I never really focused in depth on what fog computing is, where the concept of fog computing came from, how it came about, why it has been introduced, and how fog computing will shape the future of information technology. With this writing, my goal is to address every point mentioned above, and provide in depth knowledge of real world cases and examples of how and where fog computing is currently being used today. I will also discuss how fog computing coincides with other forms of emerging technology, and will try to gauge what impacts that these technologies will have on the future of information technology.

Thu
21
Jul

ATM Security in the Banking Industry

Contributed by Michael Mozingo

Automated Teller Machines (ATM) are used by millions of individuals every day and play an important factor in the banking footprint. Don Wetzel came up with the idea of the ATM and created the first one with the help of Tom Barnes and George Chastain. (AUTOMATED TELLER MACHINE, 1995). Chemical Bank introduced the first ATM in the United States in September of 1969 (Automated Teller Machines, 2010). Ever since the introduction by Chemical Bank, the ATM has become an important piece of technology to the banking industry as both a means for bank customers to have access to their banking information, and for banks to make money by charging fees for their usage.

This document is in PDF format. To view it click here.

Tue
28
Jun

Information Security of Apple Devices: Mac’s and IPhone’s

Contributed by Samuel Sanchez

Lately, in the past few years there has been a popular belief that the Mac OS X and the mobile IPhone are immune to viruses, worms, Trojans, etc. Apple, Inc. has repeatedly made advertisements stating that their devices are virus free and that anyone using a device other than an Apple product is vulnerable to hacking. This article will explain how this is now a proven myth and a few examples of known exploits used today.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Sistema