Sunday, January 8, 2017
Posted by manager
Reader's rate:
0
Contributed by David Balaban There exists a tremendous difference between what computer users should do to enhance their cyber security and what they really do. What is the primary reason for this? People are ignorant of the dangers that are present out there and neglect all the warning signs.... + continue reading
Tuesday, October 18, 2016
Posted by manager
Reader's rate:
0
Contributed by David Balaban The present-day cybercriminals often opt for social engineering to achieve their malevolent goals. The reason is obvious – it turns out that manipulating humans is just as effective as exploiting code vulnerabilities to hack into computer systems. Plus, it’s a no-... + continue reading
Thursday, September 15, 2016
Posted by manager
Reader's rate:
0
Contributed by Hope Roskelly Cloud computing offers many benefits to companies. These benefits come at a cost. There are many security threats and vulnerabilities that come along with utilizing cloud computing. However, there are preventative measures that companies can do to protect themselves... + continue reading
Tuesday, August 30, 2016
Posted by manager
Reader's rate:
5
Contributed by Ann Funk Technology in any field has been growing at a rapid pace, but one of the field’s that has seen the fastest growth would be that of the medical community. With this fast growth, security management and security of personal medical equipment has become a huge concern,... + continue reading
Monday, August 22, 2016
Posted by manager
Reader's rate:
0
Contributed by LoyCurtis Smith Despite efforts to extend IPv4 addressing with the introduction of private IP addressing, network address translation (one private IP to one public IP conversion), and port address translation (many private IPs to one public IP conversion), the world is still en... + continue reading

Home Page

Featured Articles

Sunday, 08/01/17 - 0 comment(s)
Contributed by David Balaban There exists a tremendous difference between what computer users should do to enhance their cyber security and what they really do. What is the primary reason for this? People are ignorant of the dangers that are present out there and neglect all the warning signs. Each year, nine million people in the USA fall... + continue reading
Monday, 08/08/16 - 0 comment(s)
Contributed by Bill Clark This paper discusses what Incident Response (IR) Planning is, what Industrial Control Systems (ICS) are, and how IR Planning pertains to ICS security. IR Planning is the process of preparing for any type of adverse event, also known as an incident, which can cause a process degradation or failure in a system. A... + continue reading

Red Tape

Tuesday, 09/08/16 - 0 comment(s)
Contributed by Lamaris Davis The responsibility of risk management in healthcare systems falls on multiple individuals within any given organization. It’s well known that most hospitals and... + continue reading

Cryptography

Monday, 22/08/16 - 0 comment(s)
Contributed by Aelphaeis Mangarae Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often... + continue reading

Exploitation

Monday, 22/08/16 - 0 comment(s)
Contributed by Shynlie Simmons This paper focuses on hacking techniques of web applications and how the implementation of security through programming can keep intruders from wreaking havoc on... + continue reading

Sistema

Monday, 22/08/16 - 0 comment(s)
Contributed by Daniel G. James You have probably heard someone make the statement, “once it is has been deleted it is gone forever!” This statement is simply just not true. Deleted files can... + continue reading

Et Cetera

Tuesday, 18/10/16 - 0 comment(s)
Contributed by David Balaban The present-day cybercriminals often opt for social engineering to achieve their malevolent goals. The reason is obvious – it turns out that manipulating humans is... + continue reading

Recommended Reading

Wednesday, 21/10/15 - 0 comment(s)
Contributed by Tarek "...With every technology there are unintended consequences. And in the case of computer technology, the unintended consequence was that inherently bad people could use the... + continue reading