Sistema

Sun
18
Mar

The Strengths and Limitations of DMZs in Network Security

Contributed by Cameron Meyer

A demilitarized zone (DMZ) in terms of a network is a segmented area in the network that is available to the public but is segmented in order to stay separated from a network’s internal private network. In other words, it separates the untrusted public Internet from the trusted network of an organization. This is done through the act of subnetting and is a useful network security design feature within the network architecture.

This document is in PDF format. To view it click here.

Tue
25
Apr

Security Concerns of Wearable Technology

Contributed by Mansur Abdulraheem

Wearable technology has grown extremely popular. From smartwatches to glasses, there are a variety of wearables that are now available to consumers for various purposes. Most consumers purchase these devices for ease of data access. Smartwatches may be used to avoid having to pull out their phone to collect basic information such as the weather forecast or to quickly read a text message or calendar reminder. Activity trackers help one improve on their workout and assist in tracking performance over time. Smart glasses allow us to better document our trips and experiences to help share with friends and family. So what happens to the data collected by wearables?

This document is in PDF format. To view it click here.

Mon
24
Apr

BGP Hijacking and Mitigation Techniques

Contributed by Christian Matlock

Due to the nature of how BGP operates and how it was designed, a series of both unintentional mistakes or malicious attacks could take place to take down an entire autonomous system; or a more nefarious act of intercepting traffic and then routing it to the correct destination could also take place. In order to combat the trusting nature of BGP, a series of threat mitigation techniques have been implemented in order to protect BGP against attacks. This includes setting up BGP neighbor authentications, filtering BGP prefixes with AS path access lists, BGP time to live (TTL) security check, and the future resource public key infrastructure (RPKI) have been put in use.

This document is in PDF format. To view it click here.

Tue
11
Apr

Database Security

Contributed by Rodney Compton

As you read along you will learn much about the process in securing a database and all the elements or encounters you can and will face. The process in securing a database is complex; however, the potential harm from not properly securing a database is far greater.

This document is in PDF format. To view it click here.

Tue
28
Feb

Best practices for firewall configuration and maintenance in higher education

Contributed by Wendell Collie Jr.

This paper's purpose is to investigate best practices for firewall configuration and maintenance in higher education. It seeks to aid these learning institutions by providing an in-depth analysis of firewalls. In particular, this study will have compared various types of firewall technologies along with its features.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Sistema