InfoSecWriters.com - Sistema http://www.infosecwriters.com/articles/sistema en Security Concerns of Wearable Technology http://www.infosecwriters.com/articles/2017/04/25/security-concerns-wearable-technology <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/t2.jpg?itok=XLoz0M4w"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/t2.jpg?itok=XLoz0M4w" width="700" height="394" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Mansur Abdulraheem</p> <p>Wearable technology has grown extremely popular. From smartwatches to glasses, there are a variety of wearables that are now available to consumers for various purposes. Most consumers purchase these devices for ease of data access. Smartwatches may be used to avoid having to pull out their phone to collect basic information such as the weather forecast or to quickly read a text message or calendar reminder. Activity trackers help one improve on their workout and assist in tracking performance over time. Smart glasses allow us to better document our trips and experiences to help share with friends and family. So what happens to the data collected by wearables? </p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/MAbdulraheem_Wearable.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/3/feed" method="post" id="fivestar-custom-widget" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--2" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Security Concerns of Wearable Technology 1/5</option><option value="40">Give Security Concerns of Wearable Technology 2/5</option><option value="60">Give Security Concerns of Wearable Technology 3/5</option><option value="80">Give Security Concerns of Wearable Technology 4/5</option><option value="100">Give Security Concerns of Wearable Technology 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-0RwnlMkw-blVmzecs-FcgVTuDl8Q1NlTn1jv5ei4AGQ" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Tue, 25 Apr 2017 13:07:13 +0000 manager 459 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/04/25/security-concerns-wearable-technology#comments BGP Hijacking and Mitigation Techniques http://www.infosecwriters.com/articles/2017/04/24/bgp-hijacking-and-mitigation-techniques <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/bgp.jpg?itok=CEv3WzwT"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/bgp.jpg?itok=CEv3WzwT" width="400" height="393" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Christian Matlock</p> <p>Due to the nature of how BGP operates and how it was designed, a series of both unintentional mistakes or malicious attacks could take place to take down an entire autonomous system; or a more nefarious act of intercepting traffic and then routing it to the correct destination could also take place. In order to combat the trusting nature of BGP, a series of threat mitigation techniques have been implemented in order to protect BGP against attacks. This includes setting up BGP neighbor authentications, filtering BGP prefixes with AS path access lists, BGP time to live (TTL) security check, and the future resource public key infrastructure (RPKI) have been put in use. </p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/CMatlock_BGP.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/3/feed" method="post" id="fivestar-custom-widget--2" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--4" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give BGP Hijacking and Mitigation Techniques 1/5</option><option value="40">Give BGP Hijacking and Mitigation Techniques 2/5</option><option value="60">Give BGP Hijacking and Mitigation Techniques 3/5</option><option value="80">Give BGP Hijacking and Mitigation Techniques 4/5</option><option value="100">Give BGP Hijacking and Mitigation Techniques 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--2" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-3J6QCFxg5se4TyjiqXg4_eH0ghgKhLH41E45Kbe8YYg" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 24 Apr 2017 13:42:49 +0000 manager 458 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/04/24/bgp-hijacking-and-mitigation-techniques#comments Database Security http://www.infosecwriters.com/articles/2017/04/11/database-security <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/dbsec.jpg?itok=P46UqfJb"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/dbsec.jpg?itok=P46UqfJb" width="500" height="486" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Rodney Compton</p> <p>As you read along you will learn much about the process in securing a database and all the elements or encounters you can and will face. The process in securing a database is complex; however, the potential harm from not properly securing a database is far greater.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/RCompton_DB.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/3/feed" method="post" id="fivestar-custom-widget--3" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--6" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Database Security 1/5</option><option value="40">Give Database Security 2/5</option><option value="60">Give Database Security 3/5</option><option value="80">Give Database Security 4/5</option><option value="100" selected="selected">Give Database Security 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="average-rating">Average: <span >5</span></span> <span class="total-votes">(<span >1</span> vote)</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--3" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-sQstkPWlByr2Pe4H1FjFRwMg-OGoCRy03up-mMOskDs" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Tue, 11 Apr 2017 11:59:09 +0000 manager 451 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/04/11/database-security#comments Best practices for firewall configuration and maintenance in higher education http://www.infosecwriters.com/articles/2017/02/28/best-practices-firewall-configuration-and-maintenance-higher-education <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/princeton.jpg?itok=T6-8OBbc"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/princeton.jpg?itok=T6-8OBbc" width="700" height="467" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Wendell Collie Jr.</p> <p>This paper's purpose is to investigate best practices for firewall configuration and maintenance in higher education. It seeks to aid these learning institutions by providing an in-depth analysis of firewalls. In particular, this study will have compared various types of firewall technologies along with its features.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/WCollie_Firewall_BP.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/3/feed" method="post" id="fivestar-custom-widget--4" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--8" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Best practices for firewall configuration and maintenance in higher education 1/5</option><option value="40">Give Best practices for firewall configuration and maintenance in higher education 2/5</option><option value="60">Give Best practices for firewall configuration and maintenance in higher education 3/5</option><option value="80">Give Best practices for firewall configuration and maintenance in higher education 4/5</option><option value="100">Give Best practices for firewall configuration and maintenance in higher education 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--4" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-CUCh49acgMflXC-EoUWmGo25jp5oEN-TQEN9FAkOakM" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Tue, 28 Feb 2017 12:38:59 +0000 manager 444 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/02/28/best-practices-firewall-configuration-and-maintenance-higher-education#comments IP Telephony: Private Branch Exchange(PBX) vs. VoIP http://www.infosecwriters.com/articles/2017/01/26/ip-telephony-private-branch-exchangepbx-vs-voip <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/IPT.png?itok=ydX3WmMp"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/IPT.png?itok=ydX3WmMp" width="256" height="256" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Billy Short</p> <p>Internet Protocol telephony (frequently referred to as IP telephony) is an important concept in enterprise communications technology. IP telephony refers to all real-time applications over IP, which include many different instant messaging programs, video-conferencing, fax services, and Voice over Internet Protocol (VoIP). This document will focus mostly on the VoIP aspect of IP telephony. </p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/BShort_IPTele.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/3/feed" method="post" id="fivestar-custom-widget--5" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--10" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give IP Telephony: Private Branch Exchange(PBX) vs. VoIP 1/5</option><option value="40">Give IP Telephony: Private Branch Exchange(PBX) vs. VoIP 2/5</option><option value="60">Give IP Telephony: Private Branch Exchange(PBX) vs. VoIP 3/5</option><option value="80">Give IP Telephony: Private Branch Exchange(PBX) vs. VoIP 4/5</option><option value="100">Give IP Telephony: Private Branch Exchange(PBX) vs. VoIP 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--5" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-WEhyppM2mq1M231zEAj7PMMWlv8q4hVe7fiK8UuO2X8" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Thu, 26 Jan 2017 13:50:18 +0000 manager 440 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/01/26/ip-telephony-private-branch-exchangepbx-vs-voip#comments Bring Your Own Device (BYOD), Best Practices in a Business Environment http://www.infosecwriters.com/articles/2017/01/19/bring-your-own-device-byod-best-practices-business-environment <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/BYOD_0.jpg?itok=WLNOIf0O"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/BYOD_0.jpg?itok=WLNOIf0O" width="500" height="428" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by James S. McKinney</p> <p>Bring Your Own Device (BYOD) is a trending business strategy that allows employees to utilize up-to-date electronic devices that they are already comfortable with. Employers benefit from increased employee satisfaction and the reduced cost of providing and maintaining electronic devices. The application of Best Practices can help a business to profit from the BYOD approach while managing the risk. Mitigating the risks associated with BYOD such as increased potential for data leakage and the exploitation of vulnerabilities introduces a host of challenges for the Information Assurance (IA) department. Establishing an acceptable device list that identifies allowed platforms and IOS versions serves to manage the diversity of end points and minimizes threats associated with outdated software. In addition a Network Access Control (NAC) should be implemented to authenticate users and validate device security.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/McKinney_BYOD.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/3/feed" method="post" id="fivestar-custom-widget--6" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--12" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Bring Your Own Device (BYOD), Best Practices in a Business Environment 1/5</option><option value="40">Give Bring Your Own Device (BYOD), Best Practices in a Business Environment 2/5</option><option value="60">Give Bring Your Own Device (BYOD), Best Practices in a Business Environment 3/5</option><option value="80">Give Bring Your Own Device (BYOD), Best Practices in a Business Environment 4/5</option><option value="100">Give Bring Your Own Device (BYOD), Best Practices in a Business Environment 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--6" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-y41sdUqYh-CGFDEqn0YShoET7Neugrk_F1gquZLPU6Y" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Thu, 19 Jan 2017 11:55:30 +0000 manager 438 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/01/19/bring-your-own-device-byod-best-practices-business-environment#comments The Introduction of Internet Protocol Version 6 (IPv6) Implementation in North Carolina Public Universities in Response to the Digital Millennium Act of 1998 http://www.infosecwriters.com/articles/2017/01/19/introduction-internet-protocol-version-6-ipv6-implementation-north-carolina <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/IPv6_1.jpg?itok=1OcFyYMP"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/IPv6_1.jpg?itok=1OcFyYMP" width="640" height="360" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Lemuel T Mattocks</p> <p>IPv4, as the driving force of the Internet, has reached its limit. The American Registry for Internet Numbers (ARIN) depleted its free address space on September 24th, 2015. (American Registry for Internet Numbers, 2015). Any new address requests must be made to facilitate the transition to IPv6. The idea of depletion is not new. The Request for Comments has been around for nearly twenty years. (Internet Task Engineering Force, 1998) Various factors have led to the delay of mass IPv6 deployment but the role of the Digital Millennium Copyright Act is usually not mentioned. Resolving these problems will hasten the transition to IPv6. The current IPv6 deployment currently stands at just over 15% as of November 2016. (Google, 2016) A seamless transition will depend on a much more rapid response considering the lack of IPv4 addresses.</p> <p>The following paper will examine the relationship between the DMCA and IP4. It will further examine the role of the RIAA which has contributed. The paper will finally examine how the newer IPv6 technology will affect the delicate relationship going forward. Resolving this question may be the key to unlocking IPv6 to a very large population of users.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/LMattocks_IPV6.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/3/feed" method="post" id="fivestar-custom-widget--7" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--14" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give The Introduction of Internet Protocol Version 6 (IPv6) Implementation in North Carolina Public Universities in Response to the Digital Millennium Act of 1998 1/5</option><option value="40">Give The Introduction of Internet Protocol Version 6 (IPv6) Implementation in North Carolina Public Universities in Response to the Digital Millennium Act of 1998 2/5</option><option value="60">Give The Introduction of Internet Protocol Version 6 (IPv6) Implementation in North Carolina Public Universities in Response to the Digital Millennium Act of 1998 3/5</option><option value="80">Give The Introduction of Internet Protocol Version 6 (IPv6) Implementation in North Carolina Public Universities in Response to the Digital Millennium Act of 1998 4/5</option><option value="100">Give The Introduction of Internet Protocol Version 6 (IPv6) Implementation in North Carolina Public Universities in Response to the Digital Millennium Act of 1998 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--7" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-RfLusY4XbL0xevn6uiyw-GyRZr2i1MmfVpE5lp140Q0" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Thu, 19 Jan 2017 11:41:55 +0000 manager 437 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/01/19/introduction-internet-protocol-version-6-ipv6-implementation-north-carolina#comments Forensically Unrecoverable Hard Drive Data Destruction http://www.infosecwriters.com/articles/2016/08/22/forensically-unrecoverable-hard-drive-data-destruction <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/hd.jpg?itok=HSszQGqA"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/hd.jpg?itok=HSszQGqA" width="320" height="320" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Daniel G. James</p> <p>You have probably heard someone make the statement, “once it is has been deleted it is gone forever!” This statement is simply just not true. Deleted files can actually be recovered if effort to do so is made shortly after deletion. Another common misconception is that formatting a data storage device will erase all data beyond recovery. This scenario is also not true. It is possible to restore partition tables on a drive and recover the entire contents! So, how can anyone be sure their data has been destroyed beyond recovery? The solution is overwriting the data with random or consecutive patterns. This can be done with a number of freeware and retail products.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/DJames_Hard_Drive.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/3/feed" method="post" id="fivestar-custom-widget--8" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--16" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Forensically Unrecoverable Hard Drive Data Destruction 1/5</option><option value="40">Give Forensically Unrecoverable Hard Drive Data Destruction 2/5</option><option value="60">Give Forensically Unrecoverable Hard Drive Data Destruction 3/5</option><option value="80">Give Forensically Unrecoverable Hard Drive Data Destruction 4/5</option><option value="100">Give Forensically Unrecoverable Hard Drive Data Destruction 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--8" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-gPGogcCl6U29-kJmgfKJfZ9qvNqZG8AG-O2vA77iv0A" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 22 Aug 2016 18:52:31 +0000 manager 431 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2016/08/22/forensically-unrecoverable-hard-drive-data-destruction#comments Fog Computing http://www.infosecwriters.com/articles/2016/08/08/fog-computing <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/fog.png?itok=XFSNJUn-"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/fog.png?itok=XFSNJUn-" width="239" height="180" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Billy Short</p> <p>During my studies here at East Carolina University, I have studied and read about many different t types of emerging technologies. For this writing, I will be focusing on fog computing. Before this report, I had only heard of fog computing mentioned occasionally during various courses. I never really focused in depth on what fog computing is, where the concept of fog computing came from, how it came about, why it has been introduced, and how fog computing will shape the future of information technology. With this writing, my goal is to address every point mentioned above, and provide in depth knowledge of real world cases and examples of how and where fog computing is currently being used today. I will also discuss how fog computing coincides with other forms of emerging technology, and will try to gauge what impacts that these technologies will have on the future of information technology.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/BShort_FogComputing.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/3/feed" method="post" id="fivestar-custom-widget--9" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--18" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Fog Computing 1/5</option><option value="40">Give Fog Computing 2/5</option><option value="60">Give Fog Computing 3/5</option><option value="80">Give Fog Computing 4/5</option><option value="100">Give Fog Computing 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--9" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-r8OQP9lI25tIK1rcXoYtuAHsOoRLhIL5Y5eTvANwchM" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 08 Aug 2016 11:41:56 +0000 manager 423 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2016/08/08/fog-computing#comments ATM Security in the Banking Industry http://www.infosecwriters.com/articles/2016/07/21/atm-security-banking-industry <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/ATM-Security.jpg?itok=O7M5nV4J"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/ATM-Security.jpg?itok=O7M5nV4J" width="700" height="466" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Michael Mozingo</p> <p>Automated Teller Machines (ATM) are used by millions of individuals every day and play an important factor in the banking footprint. Don Wetzel came up with the idea of the ATM and created the first one with the help of Tom Barnes and George Chastain. (AUTOMATED TELLER MACHINE, 1995). Chemical Bank introduced the first ATM in the United States in September of 1969 (Automated Teller Machines, 2010). Ever since the introduction by Chemical Bank, the ATM has become an important piece of technology to the banking industry as both a means for bank customers to have access to their banking information, and for banks to make money by charging fees for their usage.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/MMozingo_ATM_Security.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/3/feed" method="post" id="fivestar-custom-widget--10" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--20" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give ATM Security in the Banking Industry 1/5</option><option value="40">Give ATM Security in the Banking Industry 2/5</option><option value="60">Give ATM Security in the Banking Industry 3/5</option><option value="80">Give ATM Security in the Banking Industry 4/5</option><option value="100" selected="selected">Give ATM Security in the Banking Industry 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="average-rating">Average: <span >5</span></span> <span class="total-votes">(<span >1</span> vote)</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--10" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-WZby2RMYijw1Qpalwy6BpNhdhyyYADrR6IktM872lJI" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Thu, 21 Jul 2016 13:44:43 +0000 manager 419 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2016/07/21/atm-security-banking-industry#comments