Et Cetera

Wed
23
Sep

BYOD What You Need to Know

Contributed by Vicki Holzknecht

Wed
23
Sep

The Increasing Risks of Internet Computing

Contributed by Cerberian

Despite great benefits of the Internet, organizations of every kind assume substantial risks and costs when they provide Internet access, particularly when those connections are used to access sites containing information or images that are inappropriate, illegal or dangerous. Unrestricted Web access can result in excessive nonproductive Web surfing, creating tremendous losses in productivity and potential exposure to security breaches and legal liability.

This document is in PDF format. To view it click here.

Wed
23
Sep

Responding to Security Incidents on a Large Academic Network

Contributed by Jamie Riden

This paper describes a series of security incidents on a large academic network, and the gradual evolution of measures to deal with emerging threats. I describe various techniques used and give an honest evaluation of them as implemented on a real network with tens of thousands of active users. Thanks to the relatively open nature of academic computing environments, the reader may notice that significant emphasis is given to detection and response capabilities; obviously, preventative measures are preferable when this is possible. I hope this information will be valuable when system administrators and IT security managers are evaluating preventative measures to deploy, and when they are responding to ongoing incidents.

This document is in PDF format. To view it click here.

Mon
21
Sep

Keeping Information Secure with Remote Users: Hospitals, HIPAA Restrictions and Telecommuting

Contributed by Paul Heath

Mon
21
Sep

Information Security in the Age of Mobile Computing: A Look at the Evolution of Computing and the Efforts to Secure User Data

Contributed by Aaron Vanderbye

As our world has become increasingly digitally connected, we’ve seen tremendous growth in the wireless and mobile computing markets. With this growth has come an increased awareness in the need for advanced techniques to ensure the security of personal information making its way into “The Cloud.” This paper explores the history of computing and networking, and discusses some of the current and emerging technologies coming into use today, from smartphones and tablets, to console and handheld gaming systems and wearable fitness devices, and explores the ways engineers and manufacturers are building these devices with an eye toward keeping personal data and information secure. From encryption technologies and transmission methods used by wireless radios, to password and personal security best practices, this paper explores some of the ways users can ensure that their information remains secure in the age of mobile computing.

Pages

Subscribe to RSS - Et Cetera