Et Cetera

Wed
19
Aug

Vendor Verification: Boosting Consumer Confidence in E-Commerce

Contributed by Thomas Stroud

The purpose of this paper is to propose a new method for verifying the identities of vendors in electronic transaction processing as it relates to consumer confidence in e-commerce. Current problems plaguing consumers in the private sector will be discussed with particular attention given to ransomware and similar unwanted programs. This is followed by a discussion of the Secure Electronic Transaction protocol, which provides a framework for vendor verification, andoffers one potential solution for verifying the identities of vendors on the internet. The paper wraps up with implications of vendor verification, including its pros and cons, and finally a summary of the information presented.

This document is in PDF format. To view it click here.

Mon
17
Aug

The Necessity of Information Security Management in the Vulnerable Pharmaceutical Industry

Contributed by Shawn J. Roberts

Mon
17
Aug

Best Practices for Protecting Consumer Data

Contributed by Jillena Locklear

Fri
14
Aug

State Sponsored Cyber Hacking and Espionage

Contributed by Daniel Nguyen

sponsored cyber hacking and espionage has come up in the news more often in the past couple of years. With ever increasing amount of classified information that is stored in databases and personal computers, the amount of state sponsored hackings and cyber espionage will increase dramatically. The objective of this term paper is to describe what state sponsored cyber hacking and espionage is and how it is being used in the world today. Some examples would be stealing classified information from militaries to use as their own, agendas such as hacking film producers if they release a certain movie, and the use of wiretapping and stealing personal data.

This document is in PDF format. To view it click here.

Thu
13
Aug

Security Content Automation Protocol: Is it Beneficial?

Contributed by John Rayborn

The intent of this paper is to provide a discussion on what the Security Content Automation Protocol (SCAP) is, how organizations can utilize SCAP, and why SCAP is important to Information Security Management. Further, this paper will also look to explain the components and processes that make up SCAP, an overview to the process for vendor product’s to receive SCAP validation, and how organizations look to ensure systems on the enterprise networks are compliant with Federal Information Security Management Act (FISMA) of 2002 requirements through SCAP tools and methodology usage. This paper is meant to be informational as well as educational for awareness and discussion purposes.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera