Et Cetera

Fri
11
Sep

K-12 Information Security Breaches

Contributed by Shanda Edwards

It is easy to think of information security breaches only happening to huge companies. We assume that these hackers are looking for profitable information. Think again. Hackers vary in their experiences, motivation, and targets. According to Shields (2003), there are three type of hackers—“Script Kiddies” novice wannabe hacker who merely use a program found on the internet to gain access, criminals who utilize stolen information such as credit cards and social security numbers, and cyberterrorists looking to disrupt government functions (2003). The motivation of hackers can stem from a political, criminal, or vandalism drive (Brown & Rycham, 2010). Whereas, the targets of attacks have been reported from businesses (retail/merchant, financial, insurance, etc.), educational institutions, government and military, healthcare (medical providers) and nonprofit organizations.

Fri
11
Sep

Cyber Terrorism and Information Security

Contributed by Brett Pladna

Cyber terrorism is the wave of the future for terrorists and extremists. Besides physical attacks such as the bombing of U.S. Embassies and the September 11th, 2001 attacks on the World Trade Center, Pentagon in Washington D.C. and Shanksville, PA, terrorists have found a new way to cause destruction. Connection to the internet has added security risks because anyone can gain access to anything connected to it, unless there are security measures put in place to help prevent a breach. Taking a look at cyber terrorism in more detail gives a better idea of how to lessen the severity of attacks as well as prevent them. It is important to look at the background of cyber terrorism, what some organizations or individuals are doing to protect themselves and others, and what the U.S government is doing to help fight cyber terrorism.

Fri
11
Sep

Biometrics: 21st Century Security

Contributed by Stan Smith

Since September 11 2001 security has been in the forefront of American concerns. Granted, the general population is most concerned with personal physical security, which basically translates to physical security at the work place. We all hear of the horrible stories of disgruntled employees who bring a gun to work to kill fellow coworkers. That is not to mention the dangerous world we live in this day and time with terrorism. I think biometrics will be the biggest security tool used in the 21st century to protect the physical attributes of a company or its assets. I have decided to write my paper on this intriguing subject and how it relates to security of information networks.

This document is in PDF format. To view it click here.

Thu
10
Sep

Biometrics. What and how.

Contributed by Moustafa Kamal El-Hadidi

Humans have used body characteristics such as face, voice, gait, etc. from the day that mankind existed to recognize each other. Some characteristics don’t change over time and some do. And since each on has a unique characteristics that no other share we humans have thought of using that in our daily life, The main aim of using it after 9/11 is for security reasons. So what characteristics do we use? Are they accurate? Can we depend on them in our daily life routine?

This document is in PDF format. To view it click here.

Thu
10
Sep

Biometrics - The Wave of the Future?

Contributed by Gary Daniel

Will biometrics be a factor in our future? Of course it will, at least to the extent that it has been in our past history. We as citizens must decide upon the best methods to use and the best way to utilize this technology. Biometrics can be defined in several ways such as the study of measurable biological characteristics. In reference to Information Security it specifically applies to the automated use of physiological or behavioral characteristics to determine or verify identity.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera