Sistema

Thu
10
Sep

Mobile Device Management and Best Practices

Contributed by Adam Phelps

With the year 2014 slowly coming and quickly fading, the need to have the latest and greatest mobile device has become the new standard. Wireless speeds are increasing, Random Access Memory (RAM) is tripling, and processing time is becoming faster with half the size and power than in previous models. Moore’s law has been proven yet again. But what does this mean for those who use these fast devices for work through a company loan? How do you limit what an employee’s personal devices can access on the corporate network? What happens to the data when they leave? Who governs these rules and what is to become of them? In this paper, I plan to define what it takes to have good Mobile Device Management (MDM) policies and procedures in a corporate setting, and what a company should do to follow MDM best practices.

This document is in PDF format. To view it click here.

Wed
09
Sep

Security in Virtualization

Contributed by Larry Gene Hastings Jr

Wed
09
Sep

Securing a Virtual Environment

Contributed by Brian Fowler

In today’s world many corporations are moving into the realm of virtualization. Although this new technology allows companies to reproduce many different virtual servers and desktops, it also creates new problems in the ways of security. In this paper we will take a look at exactly what virtualization is, as it is applies to servers and desktops. Through this we will learn of the various problem and vulnerabilities that virtualization will cause. Knowing the problems with virtual systems, we will answer the real question how can a virtual environment be secured. Follow with me as we take an in depth at virtualization and the means of securing it.

This document is in PDF format. To view it click here.

Thu
27
Aug

Security Needs in Embedded Systems

Contributed by Anoop MS

The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an overview on the security processes like encryption/decryption, key agreement, digital signatures and digital certificates that are used to achieve data protection during data transfer. The paper also discusses the security requirements in the device to prevent possible physical attacks to expose the secure data such as secret keys from the device. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device.

This document is in PDF format. To view it click here.

Wed
26
Aug

Intrusion Detection

Contributed by Marlicia Pollard

For this term paper I will be discussing the subject of Intrusion detection. I will be going in depth as to what steps one could take to prevent intrusions on their network and what different signs to look for if they think that an intrusion has occurred. There are two main types of Intrusion Detection Systems, which are Host based and Network based. There are many different pros and cons to both of these systems. Intrusion Detection Systems are being developed and constantly modified to try to stop and limit the amount of attacks on network.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Sistema