Tuesday, May 26, 2015
Posted by manager
Reader's rate:
0
Contributed by Ming-Li Tabor Sony Pictures Entertainment got cyber attacked and was requested to cancel the film, The Interview. The security of the network was vulnerable to the attack. In the health care sector, patients’ medical and personal information are electronic records, which are... + continue reading
Tuesday, May 26, 2015
Posted by manager
Reader's rate:
0
Contributed by Benjamin Tillett-Wakeley Today’s enterprise environment is continually facing changes as technology grows exponentially. Today, we have a slew of new phone and tablet devices that run on mobile operating systems much different from their desktop and laptop counterparts.... + continue reading
Thursday, May 14, 2015
Posted by manager
Reader's rate:
0
Contributed by Sameer Thadani. We live in a world with a new arena for committing crimes, the Cyber arena. The Internet that’s composed of multiple connected computer networks has become the grounds of battle. As corporations and governments agencies focus on creating a strong defense in the... + continue reading
Wednesday, May 13, 2015
Posted by manager
Reader's rate:
0
Contributed by Patrick Murray This paper will focus on the current growing threat of terrorist organizations as it applies to network security threats. There are many ways that common traditional cyber-attacks could be applied by these organizations that would result in devastating results.... + continue reading
Wednesday, May 13, 2015
Posted by manager
Reader's rate:
0
Contributed by Jeffery Hammonds This research study will examine how large scale data mining may negatively affect privacy as it helps solve national and international sex trafficking crimes. The data mining tool researched here is the Memex Project; created, implemented, and managed by the... + continue reading

Home Page

Featured Articles

Tuesday, 26/05/15 - 0 comment(s)
Contributed by Ming-Li Tabor Sony Pictures Entertainment got cyber attacked and was requested to cancel the film, The Interview. The security of the network was vulnerable to the attack. In the health care sector, patients’ medical and personal information are electronic records, which are vulnerable to hackers. The purpose of research is to... + continue reading
Tuesday, 26/05/15 - 0 comment(s)
Contributed by Benjamin Tillett-Wakeley Today’s enterprise environment is continually facing changes as technology grows exponentially. Today, we have a slew of new phone and tablet devices that run on mobile operating systems much different from their desktop and laptop counterparts. Functions of these devices are increasingly used in place... + continue reading

Red Tape

151
reads
151 today
Tuesday, 26/05/15 - 0 comment(s)
Contributed by Ming-Li Tabor Sony Pictures Entertainment got cyber attacked and was requested to cancel the film, The Interview. The security of the network was vulnerable to the attack. In the... + continue reading

Cryptography

417
reads
35 today
Sunday, 17/05/15 - 0 comment(s)
Contributed from Anoop MS The data transferred from one system to another over public network can be protected by the method of encryption. On encryption the data is encrypted/scrambled by any... + continue reading

Exploitation

477
reads
32 today
Thursday, 14/05/15 - 0 comment(s)
Contributed by Debasis Mohanty Google is world’s most popular and powerful search engine which has the ability to accept pre-defined commands as input and produce unbelievable results. This... + continue reading

Sistema

183
reads
14 today
Thursday, 14/05/15 - 0 comment(s)
Contributed by Eddie Sutton The systematic and methodical Footprinting of an organization enables attackers to create a complete profile of an organization’s security posture. By using a... + continue reading

Et Cetera

138
reads
138 today
Tuesday, 26/05/15 - 0 comment(s)
Contributed by Ralph Edward Sutton, Jr. Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot and what exactly it was I... + continue reading