Et Cetera

Sun
10
Mar

Fundamentals of Network Segmentation

Contributed by Arthur Wyatt

Mon
04
Mar

Internet of Things (IoT) Security on Consumer Devices

Contributed by Mark E. Turner
In the past 5 years, the Internet of Things (IoT) has exploded onto the computing world and changed markets with it.  No market has been changed more than the consumer market.  As a result, consumers have enjoyed huge improvements to their everyday lives.  While IoT has provided many benefits, it has also brought many challenges with it.  The most significant of these challenges is how these devices have impacted consumer network security.
 
 
This document is in PDF format. To view it click here.

Fri
28
Dec

Digital Social Engineering Attacks

Contributed by Christopher Hovis
This paper will look at how social engineers exploit human vulnerabilities through digital social engineering attacks and how those attacks can affect the confidentiality, integrity, and accessibility of information and computer systems. Social engineering attacks are propagated by malicious links, spoofing websites, SMS text, or pop-up windows that ask for sensitive information or infect the target’s computer with malware for use in a later attack. This paper will define the types of human vulnerabilities that are exploited during a social engineering attack and define and discuss the most used attack techniques that are carried out by social engineers in the attempt to collect a target’s information, gain access to their systems, or prevent them from accessing their systems or devices.
This document is in PDF format. To view it click here.
 
 
 

Sun
09
Dec

HIPAA Rules and Current Threats for EHR’s

Contributed by David McDaniel

Thu
29
Nov

Network Security for the Small-Medium Business

Contributed by Anthony Mercer

Pages

Subscribe to RSS - Et Cetera