Sistema

Wed
26
Aug

Evaluation of ChromeOS in Schools from an Information Security Management Perspective

Contributed by Jonathan Fortune

In the last 25 years the K-12 public education system in the United States has seen a dramatic shift in its use of technology in the classroom. Both school districts and individual schools are increasingly faced with the decision about what kind of technology will be used inside, and in some cases, outside the classroom. Schools are increasingly seeking the goal of 1:1 technology, meaning that there is a device for each student in the school. This along with, in many cases, significant resources allocated for purchasing devices such as Title 1 funding for low-income schools, has resulted in an unprecedented increase in the amount of personal devices within public schools.

This document is in PDF format. To view it click here.

Mon
24
Aug

Cloud Computing Security

Contributed by Velma Edwards

Cloud computing is the hottest topic in Technology these days. Many businesses have started outsourcing there IT to the cloud because of the benefits that cloud offers. Cloud computing has given a business a new way to effectively improved business processes with less spending in IT budget. Enterprises are quickly moving from buying to renting what they need, but the biggest concern about cloud computing are security and privacy. In this paper, I am going to discuss the definition of cloud computing and how it works, types and services, advantages and disadvantages, security issues and concern, ways to protect data in the cloud, and examples of free encryption software that we can use to protect our data in the cloud.

This document is in PDF format. To view it click here.

Fri
21
Aug

Introduction to Database Log Management

Contributed by Anton Chuvakin, Ph.D.

Database security have been capturing more and more attention in recent years, even though most of the security issues surrounding databases existed since the first day commercial database systems were introduced in the market in the 1980s.

This document is in PDF format. To view it click here.

Thu
20
Aug

Protected – but 0wned: A Real-world Example of Today’s Desktop Security Technology Limitations

Contributed by Anton Chuvakin

Here is my account of an incident story, which I initially mentioned here (http://chuvakin.blogspot.com/2007/04/answer-to-my-antivirus-mystery-ques...), with some details changed to protect the innocent, who was smart enough to call me for help.

This document is in PDF format. To view it click here.

Thu
20
Aug

Wireless Intrusion Detection Systems Including Incident Response & Wireless Policy

Contributed by Jeff Dixon

Wireless has opened a new and exciting world for many of us. Its technology is advancing and changing every day and its popularity is increasing. The biggest concern with wireless, however, has been security. For some time wireless has had very poor, if any, security on a wide open medium. Along with improved encryption schemes, a new solution to help combat this problem is the Wireless Intrusion Detection System (WIDS). In the security and wireless world this has fast become a major part of securing a network. The next sections will cover details of what a WIDS is and can do, along with incident response, and creating a wireless policy.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Sistema