Red Tape


Ethics of the Vulnerability Research and Penetration Testing

Contributed by David Balaban
One can easily find weak points and vulnerabilities virtually everywhere: our bodies are vulnerable to viruses and weak in front of the eternity, and there’s a lot of weak points in our memory and our mind. All the software solutions we create are also imperfect. In this article, I will try to address matters related to the ethics of the vulnerability research and pentesing.
This document is in PDF format. To view it click here.


The Impact of Bring Your Own Device (BYOD) to the Architectural Development Process

Contributed by James S. McKinney


Information Security Management Systems

Contributed by Dietrich Lehr

Information has always been a vital part of any business. Today, information is shared globally in an instant and able to be accessed remotely. This has brought about the need for a method of ensuring that this information can be protected securely and unauthorized access and data loss is mitigated. There are several organizations in existence today that have sought to create a set of universal standards that can be tailored and applied to a company, regardless of size, in pursuit of information security. This paper will examine the International Organization for Standardization 27001 standard that exist today to assist companies in creating their own information security management systems. I will also examine digital commercial solutions that are designed to accelerate and automate the implementation of information security management systems used to secure information assets in the workplace.


Privacy Concerns in Modern America

Contributed by Reverend Jerry L Cason Jr.

The fourth amendment to the constitution promised the right to privacy for every American citizen. Protections were put in place to help ensure these rights wouldn’t be violated. For instance, the United States government needs probable cause and a warrant to search things like our homes and person. When it comes to the Internet and technology, these types of protections don’t seem to exist. For years the government has been fighting hard to strip the privacy of American citizens online. The legality of these programs has appeared to be of no concern to the government which has been caught time and again attempting to hide these tactics from the American populace.

This document is in PDF format. To view it click here.


Best Practices for Implementing Access Control Systems

Contributed by Isaac McGuire

As a network administrator or information security specialist, you might find yourself wondering if your network is safe. You are constantly asking yourself, “What can I do to ensure that the data on my network is protected?” One of the ways to protect your network is what I would like to talk about and that method is through access control systems. In this paper, I am going to cover what access control is. I am also going to talk about the two different types of access control, physical and logical, and some of the methods of both. Next, and the main point, I would like to talk about the security best practices for implementing access control systems. Access control systems are powerful security tools that can help you protect the data on your network.

This document is in PDF format. To view it click here.


Subscribe to RSS - Red Tape