Sistema

Tue
29
Dec

Is Your Device Being Held Hostage?

Contributed by A. Michele Parrish

Ransomware could be a potential problem for users of electronic devices. This paper will examine ransomware. I will discuss what it is and how your device can be infected. I will explore the reasons why it is growing and the new devices it is infecting. I will also explain ways in which a normal user can protect themselves against ransomware.

This document is in PDF format. To view it click here.

Thu
10
Dec

Mobile Device Security

Contributed by Boyd Aaron Sigmon

Daily usage of mobile devices, such as smartphones and tablets, has surpassed desktop and laptop computers in this day and age. Because of the growing popularity of these pocket-sized computing devices, and the fact that they are almost always full of a person’s personal information, attackers now have a number of incentives to try to compromise your mobile device. The purpose of this paper is to discuss some of the most common types of mobile device security threats today, and to provide you with the knowledge of how to protect your mobile device against them.

This document is in PDF format. To view it click here.

Fri
27
Nov

Virtual Machines and Security

Contributed by Paola Stone Martinez

The rapid growth of technologies, nowadays, demands a high availability of equipment. One of these areas is the Information Technology (IT) field where the continuous development of new software is not backed up by hardware improvements. In the IT field it is very common to find that companies have equipment with great physical capabilities, but it is not being used at its maximum. Individual severs machines often run at 5 – 10% CPU utilization. By using virtualization, various virtual servers can be consolidated within in physical server while still allowing independent configuration and failure isolation” [1]. These are some of the reasons of why virtualization has become very popular, and more companies and individuals are opting for its use

Wed
25
Nov

D-WARD, DDoS and Three Network Administrative Domains

Contributed by Hang Chau

DoS/DDoS attacks are a virulent, relatively new type of Internet attacks, they have caused some biggest web sites on the world -- owned by the most famous E-Commerce companies such as Yahoo, eBay, Amazon -- became inaccessible to customers, partners, and users, the financial losses are very huge.

This document is in PDF format. To view it click here.

Fri
20
Nov

Apple iOS Security

Contributed by Tyler Jeffords

Pages

Subscribe to RSS - Sistema