End Point Security - Securing the final three feet

Contributed by Charles F. Moore

Information security has tended to be reactive over the years. With each new virus, or worm the system administrators struggled to get updates out to the end points. Even if the system administrators were successful, there was always the potential that one device was missed. One device is all it would take to cripple the network. This paper will examine several ways that system administrators can begin contemplating and planning on implementing end point security in their organization. It is time for security to get to the last three feet and protect the organizations assets.

This document is in PDF format. To view it click here.


Is Your Device Being Held Hostage?

Contributed by A. Michele Parrish

Ransomware could be a potential problem for users of electronic devices. This paper will examine ransomware. I will discuss what it is and how your device can be infected. I will explore the reasons why it is growing and the new devices it is infecting. I will also explain ways in which a normal user can protect themselves against ransomware.

This document is in PDF format. To view it click here.


Mobile Device Security

Contributed by Boyd Aaron Sigmon

Daily usage of mobile devices, such as smartphones and tablets, has surpassed desktop and laptop computers in this day and age. Because of the growing popularity of these pocket-sized computing devices, and the fact that they are almost always full of a person’s personal information, attackers now have a number of incentives to try to compromise your mobile device. The purpose of this paper is to discuss some of the most common types of mobile device security threats today, and to provide you with the knowledge of how to protect your mobile device against them.

This document is in PDF format. To view it click here.


Virtual Machines and Security

Contributed by Paola Stone Martinez

The rapid growth of technologies, nowadays, demands a high availability of equipment. One of these areas is the Information Technology (IT) field where the continuous development of new software is not backed up by hardware improvements. In the IT field it is very common to find that companies have equipment with great physical capabilities, but it is not being used at its maximum. Individual severs machines often run at 5 – 10% CPU utilization. By using virtualization, various virtual servers can be consolidated within in physical server while still allowing independent configuration and failure isolation” [1]. These are some of the reasons of why virtualization has become very popular, and more companies and individuals are opting for its use


D-WARD, DDoS and Three Network Administrative Domains

Contributed by Hang Chau

DoS/DDoS attacks are a virulent, relatively new type of Internet attacks, they have caused some biggest web sites on the world -- owned by the most famous E-Commerce companies such as Yahoo, eBay, Amazon -- became inaccessible to customers, partners, and users, the financial losses are very huge.

This document is in PDF format. To view it click here.


Subscribe to RSS - Sistema