Et Cetera

Mon
17
Aug

The Necessity of Information Security Management in the Vulnerable Pharmaceutical Industry

Contributed by Shawn J. Roberts

Mon
17
Aug

Best Practices for Protecting Consumer Data

Contributed by Jillena Locklear

Fri
14
Aug

State Sponsored Cyber Hacking and Espionage

Contributed by Daniel Nguyen

sponsored cyber hacking and espionage has come up in the news more often in the past couple of years. With ever increasing amount of classified information that is stored in databases and personal computers, the amount of state sponsored hackings and cyber espionage will increase dramatically. The objective of this term paper is to describe what state sponsored cyber hacking and espionage is and how it is being used in the world today. Some examples would be stealing classified information from militaries to use as their own, agendas such as hacking film producers if they release a certain movie, and the use of wiretapping and stealing personal data.

This document is in PDF format. To view it click here.

Thu
13
Aug

Security Content Automation Protocol: Is it Beneficial?

Contributed by John Rayborn

The intent of this paper is to provide a discussion on what the Security Content Automation Protocol (SCAP) is, how organizations can utilize SCAP, and why SCAP is important to Information Security Management. Further, this paper will also look to explain the components and processes that make up SCAP, an overview to the process for vendor product’s to receive SCAP validation, and how organizations look to ensure systems on the enterprise networks are compliant with Federal Information Security Management Act (FISMA) of 2002 requirements through SCAP tools and methodology usage. This paper is meant to be informational as well as educational for awareness and discussion purposes.

This document is in PDF format. To view it click here.

Thu
13
Aug

Bring Your Own Devices in Business and Education

Contributed by Theresa Meza

Pages

Subscribe to RSS - Et Cetera