Red Tape

Thu
27
Dec

Managing Access in an Enterprise Environment

Contributed by Marc Colonna
Access control starts with the front door to the organization, continues with appropriate security in and outside of the data center, and finishes with good user education. Strong and competent companies will employ the appropriate security standards deemed necessary for their organization. “If your data could be of any value to someone without proper authorization to access it, then your organization needs strong access control” (Martin, 2018). Physical security such as security cameras and security doors are only as functional as the habits of those who are using them. Control over network access and network resources must be suitable for the data it is protecting. Policies are required to keep these systems in balance and always improving as technology changes.
 
This document is in PDF format. To view it click here.

Sun
25
Nov

Hacking the Human

Contributed by David McDaniel

Sat
27
Oct

Developing a Secure Manufacturing Industrial Internet of Things (IIOT) Environment

Contributed by Andres Castillo
 
Technology advances constantly and in the process of developing new ways to collect data, new security concerns become more prevalent. In order to increase profit, manufacturing requires increased efficiencies in processes and procedures, data collection is essential to the environment as a whole. It also provides valuable information for improving quality, time, maintenance plans, environmental data, as well as providing archived information for future evaluations. Developing a secured infrastructure is paramount to ensuring the companies data does not become susceptible to virus attacks, ransomware or fall into the wrong hands. Within this paper we will address intrusion and detection security for IIOT devices and developing a secure data strategy to address securing data collection points, securing hardware and transmission paths, as well as determining risk and providing solutions.
 
 

Sun
26
Aug

Identification, Assessment, and Management of Risks in InfoSec

Contributed by David McDaniel

Fri
08
Jun

The Evolution of Patent Laws

Contributed by Jerrette McCrimmon

Pages

Subscribe to RSS - Red Tape