Sistema

Mon
11
Jan

Implementation of a File Integrity Check System

Contributed by Don Mosley

The area of real-time Intrusion Detection and Prevention utilizing intelligent routers or various network attached appliances has received much press in the last few years. Should any of these defenses provide less than 100% effective coverage the user will be left unaware of any 'mischief' that might have gotten through. There is still a need for non real-time scanning of system files to determine any unauthorized modifications. This type of audit is often the only effective way to spot malicious activity originating from inside the enterprise network. This paper will outline mechanisms and practices for effective file integrity checking.

This document is in PDF format. To view it click here.

Wed
30
Dec

Essential Trends and Dynamics of the Endpoint Security Industry

Contributed by Lenny Zeltser and an Anonymous author

This paper examines trends and dynamics of the endpoint security industry, and shows how business strategies of market leaders such as Symantec exemplify these factors. When exploring current developments in the information security marketplace, we stipulate that this sector is beginning to converge with the general IT software industry in response to factors such as the evolution of the industry structure, competitive dynamics, regulatory compliance efforts, and the maturing state of security products.

This document is in PDF format. To view it click here.

Wed
30
Dec

End Point Security - Securing the final three feet

Contributed by Charles F. Moore

Information security has tended to be reactive over the years. With each new virus, or worm the system administrators struggled to get updates out to the end points. Even if the system administrators were successful, there was always the potential that one device was missed. One device is all it would take to cripple the network. This paper will examine several ways that system administrators can begin contemplating and planning on implementing end point security in their organization. It is time for security to get to the last three feet and protect the organizations assets.

This document is in PDF format. To view it click here.

Tue
29
Dec

Is Your Device Being Held Hostage?

Contributed by A. Michele Parrish

Ransomware could be a potential problem for users of electronic devices. This paper will examine ransomware. I will discuss what it is and how your device can be infected. I will explore the reasons why it is growing and the new devices it is infecting. I will also explain ways in which a normal user can protect themselves against ransomware.

This document is in PDF format. To view it click here.

Thu
10
Dec

Mobile Device Security

Contributed by Boyd Aaron Sigmon

Daily usage of mobile devices, such as smartphones and tablets, has surpassed desktop and laptop computers in this day and age. Because of the growing popularity of these pocket-sized computing devices, and the fact that they are almost always full of a person’s personal information, attackers now have a number of incentives to try to compromise your mobile device. The purpose of this paper is to discuss some of the most common types of mobile device security threats today, and to provide you with the knowledge of how to protect your mobile device against them.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Sistema