Forensically Unrecoverable Hard Drive Data Destruction

Contributed by Daniel G. James

You have probably heard someone make the statement, “once it is has been deleted it is gone forever!” This statement is simply just not true. Deleted files can actually be recovered if effort to do so is made shortly after deletion. Another common misconception is that formatting a data storage device will erase all data beyond recovery. This scenario is also not true. It is possible to restore partition tables on a drive and recover the entire contents! So, how can anyone be sure their data has been destroyed beyond recovery? The solution is overwriting the data with random or consecutive patterns. This can be done with a number of freeware and retail products.

This document is in PDF format. To view it click here.


Fog Computing

Contributed by Billy Short

During my studies here at East Carolina University, I have studied and read about many different t types of emerging technologies. For this writing, I will be focusing on fog computing. Before this report, I had only heard of fog computing mentioned occasionally during various courses. I never really focused in depth on what fog computing is, where the concept of fog computing came from, how it came about, why it has been introduced, and how fog computing will shape the future of information technology. With this writing, my goal is to address every point mentioned above, and provide in depth knowledge of real world cases and examples of how and where fog computing is currently being used today. I will also discuss how fog computing coincides with other forms of emerging technology, and will try to gauge what impacts that these technologies will have on the future of information technology.


ATM Security in the Banking Industry

Contributed by Michael Mozingo

Automated Teller Machines (ATM) are used by millions of individuals every day and play an important factor in the banking footprint. Don Wetzel came up with the idea of the ATM and created the first one with the help of Tom Barnes and George Chastain. (AUTOMATED TELLER MACHINE, 1995). Chemical Bank introduced the first ATM in the United States in September of 1969 (Automated Teller Machines, 2010). Ever since the introduction by Chemical Bank, the ATM has become an important piece of technology to the banking industry as both a means for bank customers to have access to their banking information, and for banks to make money by charging fees for their usage.

This document is in PDF format. To view it click here.


Information Security of Apple Devices: Mac’s and IPhone’s

Contributed by Samuel Sanchez

Lately, in the past few years there has been a popular belief that the Mac OS X and the mobile IPhone are immune to viruses, worms, Trojans, etc. Apple, Inc. has repeatedly made advertisements stating that their devices are virus free and that anyone using a device other than an Apple product is vulnerable to hacking. This article will explain how this is now a proven myth and a few examples of known exploits used today.

This document is in PDF format. To view it click here.


Current Security Issues within the Android Operating System

Contributed by Leonard M. Pickering

Android is a mobile Operating System (OS) developed by Google based on the Linux kernel. The OS was initially developed by Android, Inc. with the backing of Google in 2005. After three years of development, the first Android based mobile phone was available for sale in November of 2008. As of today, the Android operating system has been installed on over 1.4 billion devices, and is currently the most widely used computer operating system in the world. Due to the constantly increasing number of Android specific malware and other exploits, it has also become the most targeted and most vulnerable.

This document is in PDF format. To view it click here.


Subscribe to RSS - Sistema