InfoSecWriters.com http://infosecwriters.com en Network Management on a Budget http://infosecwriters.com/articles/2017/06/16/network-management-budget <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/cube.jpg?itok=D_L-uEm2"><img typeof="foaf:Image" src="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/cube.jpg?itok=D_L-uEm2" width="700" height="464" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Timothy Burns</p> <p>Monitoring a network includes many different things. The scope needs to be very broad to incorporate many details in between. Having a good plan in place along with helpful applications is key to having a healthy network and being able to troubleshoot potential problems when they occur. Many software companies have been created and do very well in specializing in network monitoring. However, while some software can be quite expensive and do provide a tremendous value, many smaller companies simply do not have the budget to make these kinds of purchases. In certain environments they are worth every penny. Smaller IT departments have smaller budgets and usually have to do without or find alternatives. Thankfully there is software available that is open source which can be used for free that in many cases can compete with the paid for alternatives. However, there are cons that should be kept in mind with using open source as well. This discussion will revolve around some of the methods that are used to monitor networks. Equally, which applications can provide the ability to use those methods and if there is a cost alternative application that can be used.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/TBurns_NetManage.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/rss.xml" method="post" id="fivestar-custom-widget" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--2" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Network Management on a Budget 1/5</option><option value="40">Give Network Management on a Budget 2/5</option><option value="60">Give Network Management on a Budget 3/5</option><option value="80">Give Network Management on a Budget 4/5</option><option value="100">Give Network Management on a Budget 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-V0sQg6JE98tKpn0OJxLPTXCSa6u81tOjhcXA2mO2ESQ" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Fri, 16 Jun 2017 13:39:54 +0000 manager 471 at http://infosecwriters.com http://infosecwriters.com/articles/2017/06/16/network-management-budget#comments Information Security Management Systems http://infosecwriters.com/articles/2017/06/06/information-security-management-systems <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/elephant.jpg?itok=g3MAbEFJ"><img typeof="foaf:Image" src="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/elephant.jpg?itok=g3MAbEFJ" width="700" height="420" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Dietrich Lehr</p> <p>Information has always been a vital part of any business. Today, information is shared globally in an instant and able to be accessed remotely. This has brought about the need for a method of ensuring that this information can be protected securely and unauthorized access and data loss is mitigated. There are several organizations in existence today that have sought to create a set of universal standards that can be tailored and applied to a company, regardless of size, in pursuit of information security. This paper will examine the International Organization for Standardization 27001 standard that exist today to assist companies in creating their own information security management systems. I will also examine digital commercial solutions that are designed to accelerate and automate the implementation of information security management systems used to secure information assets in the workplace.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/DLehr_ISMS.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/rss.xml" method="post" id="fivestar-custom-widget--2" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--4" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Information Security Management Systems 1/5</option><option value="40">Give Information Security Management Systems 2/5</option><option value="60">Give Information Security Management Systems 3/5</option><option value="80">Give Information Security Management Systems 4/5</option><option value="100" selected="selected">Give Information Security Management Systems 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="average-rating">Average: <span >5</span></span> <span class="total-votes">(<span >2</span> votes)</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--2" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-Zw-h3fL7qsmVm8PRdD5PtPzy_rYnNH1AMSoNR1u5yeo" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Tue, 06 Jun 2017 16:03:30 +0000 manager 470 at http://infosecwriters.com http://infosecwriters.com/articles/2017/06/06/information-security-management-systems#comments The Importance of Digital Certificates http://infosecwriters.com/articles/2017/05/22/importance-digital-certificates <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/key.png?itok=p9tqVZ7N"><img typeof="foaf:Image" src="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/key.png?itok=p9tqVZ7N" width="700" height="530" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by </p> <p>The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they should not purchase something that doesn’t have a digital certificate and about a hacker group called Suckfly using digital certificates to exploit them for their benefits.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/CEnriquez_Cert.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/rss.xml" method="post" id="fivestar-custom-widget--3" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--6" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give The Importance of Digital Certificates 1/5</option><option value="40">Give The Importance of Digital Certificates 2/5</option><option value="60">Give The Importance of Digital Certificates 3/5</option><option value="80">Give The Importance of Digital Certificates 4/5</option><option value="100">Give The Importance of Digital Certificates 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--3" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-knaLrWUrZQ-Mwe-Gv6yVQHtprgGB1hlUTmFbQRgTCtM" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 22 May 2017 13:01:57 +0000 manager 469 at http://infosecwriters.com http://infosecwriters.com/articles/2017/05/22/importance-digital-certificates#comments Smart Home Technology and Vulnerabilities http://infosecwriters.com/articles/2017/05/16/smart-home-technology-and-vulnerabilities <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/home.jpg?itok=fWrHSqCD"><img typeof="foaf:Image" src="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/home.jpg?itok=fWrHSqCD" width="700" height="700" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Kelly Gould</p> <p>In today’s homes, it is not unusual to see various devices connected to the internet intended to make our daily lives easier. These devices can oversee anything from keeping our homes at the proper temperature, to watering our garden, to giving us our daily news briefing, to locking our doors at night. While these devices are intended to make our lives easier, they can also cause a potential headache if the wrong people gain access. This paper will go over what smart home technology is and how it is used, various devices currently on the market, current vulnerabilities that have been found and used by hackers, and the current legal status pertaining to what is considered personal information and evidence regarding smart devices.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/KGould_Home.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/rss.xml" method="post" id="fivestar-custom-widget--4" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--8" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Smart Home Technology and Vulnerabilities 1/5</option><option value="40">Give Smart Home Technology and Vulnerabilities 2/5</option><option value="60">Give Smart Home Technology and Vulnerabilities 3/5</option><option value="80">Give Smart Home Technology and Vulnerabilities 4/5</option><option value="100">Give Smart Home Technology and Vulnerabilities 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--4" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-DNDfsm634qhD8CyptVhdIBV_wHMWFkksleAibB2Ixj0" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Tue, 16 May 2017 13:06:35 +0000 manager 468 at http://infosecwriters.com http://infosecwriters.com/articles/2017/05/16/smart-home-technology-and-vulnerabilities#comments Internet of Things (IoT) Attacks http://infosecwriters.com/articles/2017/05/11/internet-things-iot-attacks <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/iot.jpg?itok=STB9f1ca"><img typeof="foaf:Image" src="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/iot.jpg?itok=STB9f1ca" width="412" height="356" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Victoria Ellsworth</p> <p>The Internet of Things (IoT) is based off a larger concept; the Internet of Things came from idea of the Internet of Everything. The Internet of Everything (IoE) is the idea of bringing together people, process data and things. The Internet of Everything is important because it allows us to make network connections between things that were never possible, creating a more enriching, relevant and new opportunities. The Internet of Things has allowed us to provide more physical objects connected to the internet. The growth in IoT technologies in such a short amount of time is significant and will be an important factor in knowing how to protect an organization, community and your own personal data. Understanding reasoning for IoT attacks and the preliminary measures needed protect asset will give you a better understanding and knowledge in the growing world of technology.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/VEllsworth_IOT.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/rss.xml" method="post" id="fivestar-custom-widget--5" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--10" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Internet of Things (IoT) Attacks 1/5</option><option value="40">Give Internet of Things (IoT) Attacks 2/5</option><option value="60">Give Internet of Things (IoT) Attacks 3/5</option><option value="80">Give Internet of Things (IoT) Attacks 4/5</option><option value="100">Give Internet of Things (IoT) Attacks 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--5" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-8jfPHw0J0wCaaHTu-bUbupAnM3U3p4_WrkBX_MbPZUU" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Thu, 11 May 2017 17:18:39 +0000 manager 467 at http://infosecwriters.com http://infosecwriters.com/articles/2017/05/11/internet-things-iot-attacks#comments Virtual Private Network http://infosecwriters.com/articles/2017/05/09/virtual-private-network <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/tunnel2.jpg?itok=2hpzjyvH"><img typeof="foaf:Image" src="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/tunnel2.jpg?itok=2hpzjyvH" width="700" height="525" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Ann Funk</p> <p>Virtual Private Networks are increasing in popularity every day. This is due in large part to computer users wanting to keep their browsing habits private. The popularity is also due to the fact that VPNs are a relatively low cost, flexible and easy to use. While they may be easy, there is still a lot to learn about VPN’s.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/AFunk_VPN.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/rss.xml" method="post" id="fivestar-custom-widget--6" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--12" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Virtual Private Network 1/5</option><option value="40">Give Virtual Private Network 2/5</option><option value="60">Give Virtual Private Network 3/5</option><option value="80">Give Virtual Private Network 4/5</option><option value="100">Give Virtual Private Network 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--6" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-E_cFi3k88miTRgG7bx0p4wdwY-pcQbE84IneGvSpA78" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Tue, 09 May 2017 13:09:28 +0000 manager 466 at http://infosecwriters.com http://infosecwriters.com/articles/2017/05/09/virtual-private-network#comments Privacy Concerns in Modern America http://infosecwriters.com/articles/2017/05/05/privacy-concerns-modern-america <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/privacy.jpg?itok=F6efbg0Q"><img typeof="foaf:Image" src="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/privacy.jpg?itok=F6efbg0Q" width="429" height="311" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Reverend Jerry L Cason Jr.</p> <p>The fourth amendment to the constitution promised the right to privacy for every American citizen. Protections were put in place to help ensure these rights wouldn’t be violated. For instance, the United States government needs probable cause and a warrant to search things like our homes and person. When it comes to the Internet and technology, these types of protections don’t seem to exist. For years the government has been fighting hard to strip the privacy of American citizens online. The legality of these programs has appeared to be of no concern to the government which has been caught time and again attempting to hide these tactics from the American populace.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/JCason_Privacy.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/rss.xml" method="post" id="fivestar-custom-widget--7" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--14" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Privacy Concerns in Modern America 1/5</option><option value="40">Give Privacy Concerns in Modern America 2/5</option><option value="60">Give Privacy Concerns in Modern America 3/5</option><option value="80">Give Privacy Concerns in Modern America 4/5</option><option value="100">Give Privacy Concerns in Modern America 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--7" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-viI-gvITIpBJBsLwqwMSiA0tPmv-tBbGInFJaEUxDSk" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Fri, 05 May 2017 13:02:04 +0000 manager 465 at http://infosecwriters.com http://infosecwriters.com/articles/2017/05/05/privacy-concerns-modern-america#comments Video Surveillance: Best practices http://infosecwriters.com/articles/2017/05/03/video-surveillance-best-practices <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/video.jpg?itok=wjqEK4mw"><img typeof="foaf:Image" src="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/video.jpg?itok=wjqEK4mw" width="500" height="489" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Billy Short</p> <p>Video surveillance is becoming more and more prevalent in today's enterprise environments. Business factors that include security, accountability and monitoring needs drive the implementation of video surveillance systems. Video surveillance systems help keep company assets safe, monitors organizational processes and ensures accountability throughout the entire facility.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/BShort_Video.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/rss.xml" method="post" id="fivestar-custom-widget--8" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--16" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Video Surveillance: Best practices 1/5</option><option value="40">Give Video Surveillance: Best practices 2/5</option><option value="60">Give Video Surveillance: Best practices 3/5</option><option value="80">Give Video Surveillance: Best practices 4/5</option><option value="100">Give Video Surveillance: Best practices 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--8" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-pGLD9yxZZLChNf54cdaMAq5uB2zBTWYM2s3iS-pmJVE" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Wed, 03 May 2017 12:57:10 +0000 manager 464 at http://infosecwriters.com http://infosecwriters.com/articles/2017/05/03/video-surveillance-best-practices#comments Data Theft http://infosecwriters.com/articles/2017/05/01/data-theft <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/thief.jpg?itok=AJ2CDI-9"><img typeof="foaf:Image" src="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/thief.jpg?itok=AJ2CDI-9" width="350" height="244" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Cameron Meyer</p> <p>Data theft is an ever present and continually growing issue in today’s networked world. Data theft is not simply an issue for individual computer users; it plagues large corporations and governments as well. With this in mind, individual’s privacy and financial standing are at risk in these attacks. Corporations are primarily affected monetarily and when governments are attacked, it can bring on national security issues. Individuals targeted for data theft are at risk of having their identities stolen and potentially suffering personal monetary damages. Corporate data theft has now become one of the most significant concerns for companies of every size and cybersecurity teams are essential to companies in order for companies to be successful. </p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/CMeyer_DataTheft.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/rss.xml" method="post" id="fivestar-custom-widget--9" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--18" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Data Theft 1/5</option><option value="40">Give Data Theft 2/5</option><option value="60">Give Data Theft 3/5</option><option value="80">Give Data Theft 4/5</option><option value="100">Give Data Theft 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--9" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-Ht6Bh8xg1O9zKZgrzVEfivV1a4ErNf1m1N6lLtVBHKE" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 01 May 2017 12:02:55 +0000 manager 463 at http://infosecwriters.com http://infosecwriters.com/articles/2017/05/01/data-theft#comments Best Practices for Implementing Access Control Systems http://infosecwriters.com/articles/2017/04/28/best-practices-implementing-access-control-systems <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/safe.jpg?itok=huMnm_uA"><img typeof="foaf:Image" src="http://infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/safe.jpg?itok=huMnm_uA" width="232" height="290" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Isaac McGuire</p> <p>As a network administrator or information security specialist, you might find yourself wondering if your network is safe. You are constantly asking yourself, “What can I do to ensure that the data on my network is protected?” One of the ways to protect your network is what I would like to talk about and that method is through access control systems. In this paper, I am going to cover what access control is. I am also going to talk about the two different types of access control, physical and logical, and some of the methods of both. Next, and the main point, I would like to talk about the security best practices for implementing access control systems. Access control systems are powerful security tools that can help you protect the data on your network.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/IMcGuire_AC.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/rss.xml" method="post" id="fivestar-custom-widget--10" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--20" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Best Practices for Implementing Access Control Systems 1/5</option><option value="40">Give Best Practices for Implementing Access Control Systems 2/5</option><option value="60">Give Best Practices for Implementing Access Control Systems 3/5</option><option value="80">Give Best Practices for Implementing Access Control Systems 4/5</option><option value="100">Give Best Practices for Implementing Access Control Systems 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--10" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-jI7v4JfOMNgU6uB0CUCXKK_k8wi4lA5q1aOVNatJB94" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Fri, 28 Apr 2017 18:07:11 +0000 manager 462 at http://infosecwriters.com http://infosecwriters.com/articles/2017/04/28/best-practices-implementing-access-control-systems#comments