Et Cetera

Fri
28
Aug

Anti Brute Force Resource Metering

Contributed by Next Generation Security Software Ltd.

Web-based applications authentication processes are frequently vulnerable to automated brute force guessing attacks. Whilst commonly proposed solutions make use of escalating time delays and minimum lockout threshold strategies, these tend to prove ineffectual in real attacks and may actually promote additional attack vectors.

Resource metering through client-side computationally intensive "electronic payments" can provide an alternative strategy in defending against brute force guessing attacks. This whitepaper discusses how such a solution works and the security advantages it can bring.

This document is in PDF format. To view it click here.

Wed
19
Aug

Vendor Verification: Boosting Consumer Confidence in E-Commerce

Contributed by Thomas Stroud

The purpose of this paper is to propose a new method for verifying the identities of vendors in electronic transaction processing as it relates to consumer confidence in e-commerce. Current problems plaguing consumers in the private sector will be discussed with particular attention given to ransomware and similar unwanted programs. This is followed by a discussion of the Secure Electronic Transaction protocol, which provides a framework for vendor verification, andoffers one potential solution for verifying the identities of vendors on the internet. The paper wraps up with implications of vendor verification, including its pros and cons, and finally a summary of the information presented.

This document is in PDF format. To view it click here.

Mon
17
Aug

The Necessity of Information Security Management in the Vulnerable Pharmaceutical Industry

Contributed by Shawn J. Roberts

Mon
17
Aug

Best Practices for Protecting Consumer Data

Contributed by Jillena Locklear

Fri
14
Aug

State Sponsored Cyber Hacking and Espionage

Contributed by Daniel Nguyen

sponsored cyber hacking and espionage has come up in the news more often in the past couple of years. With ever increasing amount of classified information that is stored in databases and personal computers, the amount of state sponsored hackings and cyber espionage will increase dramatically. The objective of this term paper is to describe what state sponsored cyber hacking and espionage is and how it is being used in the world today. Some examples would be stealing classified information from militaries to use as their own, agendas such as hacking film producers if they release a certain movie, and the use of wiretapping and stealing personal data.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera