Et Cetera

Wed
16
Sep

Breaking Point: Forging Chaos and Destruction

Contributed by Jesus Oquendo

High tech wars nowadays seems to be a problem which many people overlook. While many would want to justify the means of fighting for privacy on the Internet for the sake of retaining privacy, others may use this same excuse to justify it for the means of using this shadow of privacy for committing criminal mischief for anything from financial gain, to jealousy, to experimentation. Sky's the limit when thinking of possibilities.

This document is in PDF format. To view it click here.

Tue
15
Sep

Importance of Individuals in Information Security

Contributed by A. Michele Parrish

This paper looks at the role of individuals in information security. The goal is to show that you and I are assets and liabilities when it comes to securing information. Many times we are the first line of defense whether it’s in choosing a good password, not falling prey to social engineering or in how we configure a firewall. Individuals must understand that company security is their responsibility and need to consider themselves an important component in protecting the company’s resources. They need to be trained properly in order to implement the correct measures to protect the confidentiality, integrity and availability of data. This paper will examine effective training methods and ways to motivate individuals to take security seriously.

This document is in PDF format. To view it click here.

Tue
15
Sep

The Lack of Attention in the Prevention of Cyber Crime and How to improve it

Contributed by Brett Pladna

This paper discusses the issues of cyber crime and what is being done to prevent it. Cyber criminals take advantages of vulnerabilities by using viruses, bots, etc to cause damage and/or maybe steal information. There are ways that this can be minimized by being aware of what the problems are. There are many problems but common ones are discussed. Not can these problems be solved on an individual or organization level but also on a global level. This paper will look at what cyber crime is and three topics that discuss the problems with cyber crime and how to prevent it.

This document is in PDF format. To view it click here.

Tue
15
Sep

What They Are and Who Should Use Them

Contributed by Brett Pladna

This paper will try to demonstrate the importance of computer forensics by describing procedures, tools and differences in the use for individuals/small organizations vs. large organizations. The procedures described deal with how to collect evidence and the laws that need to be followed for admission of evidence into a court room. The tools used are the basis for all tools that are available. Tools include, backing up data, authentication, decryption, file auditing, IP tracking, and data recovery and document examination. Smaller organizations might use a variety of these or all of these. The discussion of larger organizations discusses the need for digital evidence bags (DEB) due to their extreme efficiency. A digital evidence bag is used to store information from various applications such as the tools mentioned above.

Mon
14
Sep

Bluetooth Security

Contributed by Colleen Rhodes

Bluetooth provides a short range wireless communication between devices making it convenient for users and thus eliminating the need for messy cables. According to Bluetooth Special Interest Group (2006), “Bluetooth wireless technology is the most widely supported, versatile, and secure wireless standard on the market today.” Bluetooth operates in the open 2.4 GHz ISM band and is “now found in a vast array of products such as input devices, printers, medical devices, VoIP phones, whiteboards, and surveillance cameras. [However], the proliferation of these devices in the workplace exposes organizations to security risks.” (Detecting Bluetooth Security Vulnerabilities, 2005) This paper will explain what Bluetooth is, how it works, and some of the vulnerabilities and risks associated with it.

This document is in PDF format. To view it click here.

 

Pages

Subscribe to RSS - Et Cetera