Et Cetera


BITCOIN BASICS: Bitcoin Miners and their Role in Bitcoin’s Future

Contributed by Steve Ingram

This paper covers some basics of Bitcoin and some of the issues and concerns that many raise about the role Bitcoin miners will play in the future of Bitcoin. Since the inception of Bitcoin in 2009, acceptance of the protocol has grown but there are many questions that must be answered. After doing research on this topic, I have a better understanding of the Bitcoin protocol, but, I still have doubts that it will be universally excepted in the future. Bitcoin mining could be a major factor in its success. This paper is not meant to promote or criticize Bitcoin, but challenge the reader on the concept of Bitcoin mining as a viable solution for validating bitcoin transactions into the ledger system. These questions must be addressed if Bitcoin is to survive in the 21st century.

This document is in PDF format. To view it click here.


Understanding Phishing and Protecting the 8th Layer

Contributed by Anthony Ralston

This paper will focus on understanding the risk associated with phishing attacks on companies and how we can measure growth through phish benchmarking. The paper will define and look at the different angles that phishes can exploit users and how we can measure their effectiveness. The paper will look at the traditional measurements matrix based on clicks and credential harvesting. Moreover, this paper will look at cultural, quality of phish, work environment, and other factors to establish a larger picture of the risk to a company from phishing attacks. It is hoped that this paper will serve as a closer consideration what it takes to measure and protect users from phishing attacks.

This document is in PDF format. To view it click here.


Securing Access Using Different Types of User Authentication

Contributed by Ann Funk

Everyone in this day and age interacts with a computer in some form or another. These computers can take the form of ATM’s, Gas Pumps, laptops, and even watches. The one thing they all have in common is that they store or access our personal data. In this paper, we will discuss the ways that this data is secured by the use of User Authentication. We will begin by talking a little about the different types of user authentication and how it is used. Giving a little insight into the positives of each method and even giving some information about the challenges of each method allowing the user to decide exactly which method is right for them.

This document is in PDF format. To view it click here.


Software Defined Networks: What Is It and Why Do We Need It?

Contributed by A. Michele Parrish


Common Types of Recent Phishing Emails to Look out For

Contributed by David Balaban

The present-day cybercriminals often opt for social engineering to achieve their malevolent goals. The reason is obvious – it turns out that manipulating humans is just as effective as exploiting code vulnerabilities to hack into computer systems. Plus, it’s a no-brainer. All it takes is tailoring a trustworthy-looking email and sending it out to as many users as possible. By opening the attached files or clicking on embedded links, gullible recipients run the risk of catching viruses or exposing their online identity to theft.

This document is in PDF format. To view it click here.


Subscribe to RSS - Et Cetera