Fog Computing

Contributed by Billy Short

During my studies here at East Carolina University, I have studied and read about many different t types of emerging technologies. For this writing, I will be focusing on fog computing. Before this report, I had only heard of fog computing mentioned occasionally during various courses. I never really focused in depth on what fog computing is, where the concept of fog computing came from, how it came about, why it has been introduced, and how fog computing will shape the future of information technology. With this writing, my goal is to address every point mentioned above, and provide in depth knowledge of real world cases and examples of how and where fog computing is currently being used today. I will also discuss how fog computing coincides with other forms of emerging technology, and will try to gauge what impacts that these technologies will have on the future of information technology.


ATM Security in the Banking Industry

Contributed by Michael Mozingo

Automated Teller Machines (ATM) are used by millions of individuals every day and play an important factor in the banking footprint. Don Wetzel came up with the idea of the ATM and created the first one with the help of Tom Barnes and George Chastain. (AUTOMATED TELLER MACHINE, 1995). Chemical Bank introduced the first ATM in the United States in September of 1969 (Automated Teller Machines, 2010). Ever since the introduction by Chemical Bank, the ATM has become an important piece of technology to the banking industry as both a means for bank customers to have access to their banking information, and for banks to make money by charging fees for their usage.

This document is in PDF format. To view it click here.


Information Security of Apple Devices: Mac’s and IPhone’s

Contributed by Samuel Sanchez

Lately, in the past few years there has been a popular belief that the Mac OS X and the mobile IPhone are immune to viruses, worms, Trojans, etc. Apple, Inc. has repeatedly made advertisements stating that their devices are virus free and that anyone using a device other than an Apple product is vulnerable to hacking. This article will explain how this is now a proven myth and a few examples of known exploits used today.

This document is in PDF format. To view it click here.


Current Security Issues within the Android Operating System

Contributed by Leonard M. Pickering

Android is a mobile Operating System (OS) developed by Google based on the Linux kernel. The OS was initially developed by Android, Inc. with the backing of Google in 2005. After three years of development, the first Android based mobile phone was available for sale in November of 2008. As of today, the Android operating system has been installed on over 1.4 billion devices, and is currently the most widely used computer operating system in the world. Due to the constantly increasing number of Android specific malware and other exploits, it has also become the most targeted and most vulnerable.

This document is in PDF format. To view it click here.


Android and iOS Security

Contributed by Jeremiah Everett

This paper will discuss security for the Android OS and Apple's iOS. So for a little background we will look at when Android and iOS were first released. Android was released to the public on the HTC Dream in October of 2008, and Apple’s iOS came out in March of 2008. Since the time of release more and more malware has been created and need for better security has been realized. In the article Android Security: A Survey of Issues, Malware Penetration, and Defenses, they state that increased popularity of the Android device and associated monetary benefits attracted malware developers, and this resulted in a big rise of Android malware apps between 2010 and 2014.

This document is in PDF format. To view it click here.


Subscribe to RSS - Sistema