Et Cetera

Tue
16
May

Smart Home Technology and Vulnerabilities

Contributed by Kelly Gould

In today’s homes, it is not unusual to see various devices connected to the internet intended to make our daily lives easier. These devices can oversee anything from keeping our homes at the proper temperature, to watering our garden, to giving us our daily news briefing, to locking our doors at night. While these devices are intended to make our lives easier, they can also cause a potential headache if the wrong people gain access. This paper will go over what smart home technology is and how it is used, various devices currently on the market, current vulnerabilities that have been found and used by hackers, and the current legal status pertaining to what is considered personal information and evidence regarding smart devices.

This document is in PDF format. To view it click here.

Thu
11
May

Internet of Things (IoT) Attacks

Contributed by Victoria Ellsworth

The Internet of Things (IoT) is based off a larger concept; the Internet of Things came from idea of the Internet of Everything. The Internet of Everything (IoE) is the idea of bringing together people, process data and things. The Internet of Everything is important because it allows us to make network connections between things that were never possible, creating a more enriching, relevant and new opportunities. The Internet of Things has allowed us to provide more physical objects connected to the internet. The growth in IoT technologies in such a short amount of time is significant and will be an important factor in knowing how to protect an organization, community and your own personal data. Understanding reasoning for IoT attacks and the preliminary measures needed protect asset will give you a better understanding and knowledge in the growing world of technology.

Tue
09
May

Virtual Private Network

Contributed by Ann Funk

Virtual Private Networks are increasing in popularity every day. This is due in large part to computer users wanting to keep their browsing habits private. The popularity is also due to the fact that VPNs are a relatively low cost, flexible and easy to use. While they may be easy, there is still a lot to learn about VPN’s.

This document is in PDF format. To view it click here.

Wed
03
May

Video Surveillance: Best practices

Contributed by Billy Short

Video surveillance is becoming more and more prevalent in today's enterprise environments. Business factors that include security, accountability and monitoring needs drive the implementation of video surveillance systems. Video surveillance systems help keep company assets safe, monitors organizational processes and ensures accountability throughout the entire facility.

This document is in PDF format. To view it click here.

Mon
01
May

Data Theft

Contributed by Cameron Meyer

Data theft is an ever present and continually growing issue in today’s networked world. Data theft is not simply an issue for individual computer users; it plagues large corporations and governments as well. With this in mind, individual’s privacy and financial standing are at risk in these attacks. Corporations are primarily affected monetarily and when governments are attacked, it can bring on national security issues. Individuals targeted for data theft are at risk of having their identities stolen and potentially suffering personal monetary damages. Corporate data theft has now become one of the most significant concerns for companies of every size and cybersecurity teams are essential to companies in order for companies to be successful.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera