Red Tape

Sun
26
Aug

Identification, Assessment, and Management of Risks in InfoSec

Contributed by David McDaniel

Fri
08
Jun

The Evolution of Patent Laws

Contributed by Jerrette McCrimmon

Mon
26
Mar

Information Security Framework for ABCD Company

Contributed by Stephen Jenkins
This paper will emphasize a list of recommendations for establishing an efficient information security network within the ABCD Company. Along with the provided list of recommendations an explanation on how to conform to the requirements of the Sarbanes-Oxley Act.  A part of making sure that these security regulations are being met is by using the principle of separation of duties.   This paper will indicate how implementing policies physical security, logical security, access control, and network security applications can provide the necessary information security for ABCD Company to meet the necessary confidentiality, integrity and availability of the company information systems.
 
 
This document is in PDF format. To view it click here.

Tue
20
Mar

Ethics of the Vulnerability Research and Penetration Testing

Contributed by David Balaban
One can easily find weak points and vulnerabilities virtually everywhere: our bodies are vulnerable to viruses and weak in front of the eternity, and there’s a lot of weak points in our memory and our mind. All the software solutions we create are also imperfect. In this article, I will try to address matters related to the ethics of the vulnerability research and pentesing.
 
This document is in PDF format. To view it click here.

Sun
18
Mar

The Impact of Bring Your Own Device (BYOD) to the Architectural Development Process

Contributed by James S. McKinney

Pages

Subscribe to RSS - Red Tape