Et Cetera

Fri
17
Jun

Are Internet of Things Safe and Secure

Contributed by Carl Brackett

As technology advances, so do the security risks involved. In the last couple of years, a new term has been introduced to society called “Internet of Things”. This term can be used for any type of device that now connects to the Internet (Sasso, 2015). The question is how secure are these devices for consumers to be using?

This paper is going to be researching whether these devices are safe for consumers to be using in their businesses or homes. There will be several examples discussed of different devices out on the market that may or may not be secure in their usage. In determining whether these devices are secure or not, this research will look into how information obtained by these devices are or are not being kept private from the rest of the world.

This document is in PDF format. To view it click here.

Fri
10
Jun

A Diamond in the Rough

Contributed by Taylor Broach

Auto markets today are flooded with new cars equipped with features harnessing cutting edge technology. Tesla Motors leads this wave of technologically advanced cars; however, their cars not only boast the best features but they offer security in their products like none other. Many other auto makers have joined the smart car revolution and displayed various attempts at a marriage of technology and the driver. Jeep has struggled greatly with their vehicle intelligence features because they have been shown to have various security vulnerabilities and dangers. Tesla offers a refined, secure and reasonably priced electric platform for drivers to feel safe carrying their families in.

This document is in PDF format. To view it click here.

Thu
09
Jun

Hacking: What Video Gamers Love to Hate

Contributed by Matthew Cantu

This paper explains the effects hacking has on the video game industry. The paper also goes into great detail about why these hackers have become so apparent the last decade as games have become more sophisticated. The video game industry is taking a major hit each and every year and must battle everyday against these hackers to preserve, not only their game, but also their reputation. As you begin to look further into the paper you’ll discover how these companies have begun to counteract some of these hackers. Some of the hackers may be easier than others to deal with. Some are just small time hobbyists, others are large hacktivist groups looking to deal major damage.

This document is in PDF format. To view it click here.

Thu
02
Jun

Multiprotocol Label Switching: An In Depth View

Contributed by LoyCurtis Smith

Tue
31
May

Survey of Sensitive Information Detection Techniques: The need and usefulness of Machine Learning Techniques

Contributed by Riya Shah and Manisha Valera

Pages

Subscribe to RSS - Et Cetera