Et Cetera

Sun
11
Nov

BYOD Security Considerations in a College Environment

Contributed by Gregory Boykin

Sun
11
Nov

Managing Electronic Patient Health Information in a Nationwide Health Information Network

Contributed by John Branner
A lack of access to medical records can cause delays and put patient health at risk. Since 2004, the U.S. government has been working toward developing a nationwide health information network (NHIN or NwHIN) to bridge the health care information gap between geographic locations and create a “network within networks.” However, problems associated with the development of the NHIN have been noted early in the development process. Patient information security, accessibility, interoperability, and data standardization have been at the forefront of concern. This paper addresses those concerns and provides a framework for managing a nationwide patient information network.
 
 
 
This document is in PDF format. To view it click here.

Sat
27
Oct

The Safety of End-User Data in the Cloud

Contributed by Rocky Goins
Data security is a serious issue in cloud computing because of the location of use data in different places across the world. This paper will discuss the security and privacy of end user data in cloud computing. The paper will delve into the details of data protection measures used to ensure maximum data protection while reducing the risks to user data. This research paper will also compare existing research on the techniques and approaches used to secure user data on cloud platforms.
 
This document is in PDF format. To view it click here.

Sun
30
Sep

Is my Network Secure?

Contributed by Vinay Sawant

and Information Security administrator, Network and Information Security Manager, and Chief Information Security Officer (CISO) will have. This research paper discusses about various Computers and Networking related security threats and vulnerabilities in enterprise network. We also discuss about traditional security threats, latest security threats and makes a list of all the security related threats and discuss suggested mitigation methods. A detailed analysis of network security appliances, software, and management products will be presented so that reader can choose best solution for their network. Some common security implementation mistakes are also analyzed in this paper. Finally, we are discussing about network security audits and importance of up to date security patches.

 
This document is in PDF format. To view it click here.

Sun
30
Sep

Virtual Extensible Local Area Network (VXLAN) Implementation

Contributed by Vinay Sawant

VXLAN was introduced about two to three years ago and since its inception, it is becoming more popular and technology of the choice for most of the organizations. In this research paper we are discussing about: - Why we need VXLAN? What problems VXLAN solves? It is best suitable for which type of organizations? and how to implement VXLAN? This research paper also presents various VXLAN implementation and redundancy model and their analysis so that it useful for you to choose best model that best suits your business. We have also studied about: - Who are the various vendors available in the market today that support VXLAN and who are the manufacture of VXLAN Gateways and develop VXLAN software and what features they offer. We also discuss about security implementation in VXLAN network. Finally, we are concluding this research paper by listing best practices to implement VXLAN in your network.

Pages

Subscribe to RSS - Et Cetera