Et Cetera

Tue
15
Sep

What They Are and Who Should Use Them

Contributed by Brett Pladna

This paper will try to demonstrate the importance of computer forensics by describing procedures, tools and differences in the use for individuals/small organizations vs. large organizations. The procedures described deal with how to collect evidence and the laws that need to be followed for admission of evidence into a court room. The tools used are the basis for all tools that are available. Tools include, backing up data, authentication, decryption, file auditing, IP tracking, and data recovery and document examination. Smaller organizations might use a variety of these or all of these. The discussion of larger organizations discusses the need for digital evidence bags (DEB) due to their extreme efficiency. A digital evidence bag is used to store information from various applications such as the tools mentioned above.

Mon
14
Sep

Bluetooth Security

Contributed by Colleen Rhodes

Bluetooth provides a short range wireless communication between devices making it convenient for users and thus eliminating the need for messy cables. According to Bluetooth Special Interest Group (2006), “Bluetooth wireless technology is the most widely supported, versatile, and secure wireless standard on the market today.” Bluetooth operates in the open 2.4 GHz ISM band and is “now found in a vast array of products such as input devices, printers, medical devices, VoIP phones, whiteboards, and surveillance cameras. [However], the proliferation of these devices in the workplace exposes organizations to security risks.” (Detecting Bluetooth Security Vulnerabilities, 2005) This paper will explain what Bluetooth is, how it works, and some of the vulnerabilities and risks associated with it.

This document is in PDF format. To view it click here.

 

Fri
11
Sep

K-12 Information Security Breaches

Contributed by Shanda Edwards

It is easy to think of information security breaches only happening to huge companies. We assume that these hackers are looking for profitable information. Think again. Hackers vary in their experiences, motivation, and targets. According to Shields (2003), there are three type of hackers—“Script Kiddies” novice wannabe hacker who merely use a program found on the internet to gain access, criminals who utilize stolen information such as credit cards and social security numbers, and cyberterrorists looking to disrupt government functions (2003). The motivation of hackers can stem from a political, criminal, or vandalism drive (Brown & Rycham, 2010). Whereas, the targets of attacks have been reported from businesses (retail/merchant, financial, insurance, etc.), educational institutions, government and military, healthcare (medical providers) and nonprofit organizations.

Fri
11
Sep

Cyber Terrorism and Information Security

Contributed by Brett Pladna

Cyber terrorism is the wave of the future for terrorists and extremists. Besides physical attacks such as the bombing of U.S. Embassies and the September 11th, 2001 attacks on the World Trade Center, Pentagon in Washington D.C. and Shanksville, PA, terrorists have found a new way to cause destruction. Connection to the internet has added security risks because anyone can gain access to anything connected to it, unless there are security measures put in place to help prevent a breach. Taking a look at cyber terrorism in more detail gives a better idea of how to lessen the severity of attacks as well as prevent them. It is important to look at the background of cyber terrorism, what some organizations or individuals are doing to protect themselves and others, and what the U.S government is doing to help fight cyber terrorism.

Fri
11
Sep

Biometrics: 21st Century Security

Contributed by Stan Smith

Since September 11 2001 security has been in the forefront of American concerns. Granted, the general population is most concerned with personal physical security, which basically translates to physical security at the work place. We all hear of the horrible stories of disgruntled employees who bring a gun to work to kill fellow coworkers. That is not to mention the dangerous world we live in this day and time with terrorism. I think biometrics will be the biggest security tool used in the 21st century to protect the physical attributes of a company or its assets. I have decided to write my paper on this intriguing subject and how it relates to security of information networks.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera