InfoSecWriters.com - Et Cetera http://www.infosecwriters.com/articles/et-cetera en Smart Home Technology and Vulnerabilities http://www.infosecwriters.com/articles/2017/05/16/smart-home-technology-and-vulnerabilities <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/home.jpg?itok=fWrHSqCD"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/home.jpg?itok=fWrHSqCD" width="700" height="700" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Kelly Gould</p> <p>In today’s homes, it is not unusual to see various devices connected to the internet intended to make our daily lives easier. These devices can oversee anything from keeping our homes at the proper temperature, to watering our garden, to giving us our daily news briefing, to locking our doors at night. While these devices are intended to make our lives easier, they can also cause a potential headache if the wrong people gain access. This paper will go over what smart home technology is and how it is used, various devices currently on the market, current vulnerabilities that have been found and used by hackers, and the current legal status pertaining to what is considered personal information and evidence regarding smart devices.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/KGould_Home.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/6/feed" method="post" id="fivestar-custom-widget" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--2" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Smart Home Technology and Vulnerabilities 1/5</option><option value="40">Give Smart Home Technology and Vulnerabilities 2/5</option><option value="60">Give Smart Home Technology and Vulnerabilities 3/5</option><option value="80">Give Smart Home Technology and Vulnerabilities 4/5</option><option value="100">Give Smart Home Technology and Vulnerabilities 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-kbDHRDgdcryf1cwTF5-7bmjzeQ5hasjfQy4GSjgtlvQ" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Tue, 16 May 2017 13:06:35 +0000 manager 468 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/05/16/smart-home-technology-and-vulnerabilities#comments Internet of Things (IoT) Attacks http://www.infosecwriters.com/articles/2017/05/11/internet-things-iot-attacks <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/iot.jpg?itok=STB9f1ca"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/iot.jpg?itok=STB9f1ca" width="412" height="356" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Victoria Ellsworth</p> <p>The Internet of Things (IoT) is based off a larger concept; the Internet of Things came from idea of the Internet of Everything. The Internet of Everything (IoE) is the idea of bringing together people, process data and things. The Internet of Everything is important because it allows us to make network connections between things that were never possible, creating a more enriching, relevant and new opportunities. The Internet of Things has allowed us to provide more physical objects connected to the internet. The growth in IoT technologies in such a short amount of time is significant and will be an important factor in knowing how to protect an organization, community and your own personal data. Understanding reasoning for IoT attacks and the preliminary measures needed protect asset will give you a better understanding and knowledge in the growing world of technology.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/VEllsworth_IOT.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/6/feed" method="post" id="fivestar-custom-widget--2" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--4" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Internet of Things (IoT) Attacks 1/5</option><option value="40">Give Internet of Things (IoT) Attacks 2/5</option><option value="60">Give Internet of Things (IoT) Attacks 3/5</option><option value="80">Give Internet of Things (IoT) Attacks 4/5</option><option value="100">Give Internet of Things (IoT) Attacks 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--2" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-ig_S3LtHpD2NcGAY2WgPc_KDpaVj_wvr0gcT01-CXRo" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Thu, 11 May 2017 17:18:39 +0000 manager 467 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/05/11/internet-things-iot-attacks#comments Virtual Private Network http://www.infosecwriters.com/articles/2017/05/09/virtual-private-network <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/tunnel2.jpg?itok=2hpzjyvH"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/tunnel2.jpg?itok=2hpzjyvH" width="700" height="525" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Ann Funk</p> <p>Virtual Private Networks are increasing in popularity every day. This is due in large part to computer users wanting to keep their browsing habits private. The popularity is also due to the fact that VPNs are a relatively low cost, flexible and easy to use. While they may be easy, there is still a lot to learn about VPN’s.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/AFunk_VPN.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/6/feed" method="post" id="fivestar-custom-widget--3" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--6" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Virtual Private Network 1/5</option><option value="40">Give Virtual Private Network 2/5</option><option value="60">Give Virtual Private Network 3/5</option><option value="80">Give Virtual Private Network 4/5</option><option value="100">Give Virtual Private Network 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--3" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-alSFtyyBpDZ4C9lDc7JXr94SoyWcS5WbMXR0Vs2wRBg" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Tue, 09 May 2017 13:09:28 +0000 manager 466 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/05/09/virtual-private-network#comments Video Surveillance: Best practices http://www.infosecwriters.com/articles/2017/05/03/video-surveillance-best-practices <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/video.jpg?itok=wjqEK4mw"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/video.jpg?itok=wjqEK4mw" width="500" height="489" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Billy Short</p> <p>Video surveillance is becoming more and more prevalent in today's enterprise environments. Business factors that include security, accountability and monitoring needs drive the implementation of video surveillance systems. Video surveillance systems help keep company assets safe, monitors organizational processes and ensures accountability throughout the entire facility.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/BShort_Video.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/6/feed" method="post" id="fivestar-custom-widget--4" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--8" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Video Surveillance: Best practices 1/5</option><option value="40">Give Video Surveillance: Best practices 2/5</option><option value="60">Give Video Surveillance: Best practices 3/5</option><option value="80">Give Video Surveillance: Best practices 4/5</option><option value="100">Give Video Surveillance: Best practices 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--4" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-fCnQA1KKnSuru9OC5wHrDKbpy0paVKVdrjRGF9KBMHs" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Wed, 03 May 2017 12:57:10 +0000 manager 464 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/05/03/video-surveillance-best-practices#comments Data Theft http://www.infosecwriters.com/articles/2017/05/01/data-theft <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/thief.jpg?itok=AJ2CDI-9"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/thief.jpg?itok=AJ2CDI-9" width="350" height="244" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Cameron Meyer</p> <p>Data theft is an ever present and continually growing issue in today’s networked world. Data theft is not simply an issue for individual computer users; it plagues large corporations and governments as well. With this in mind, individual’s privacy and financial standing are at risk in these attacks. Corporations are primarily affected monetarily and when governments are attacked, it can bring on national security issues. Individuals targeted for data theft are at risk of having their identities stolen and potentially suffering personal monetary damages. Corporate data theft has now become one of the most significant concerns for companies of every size and cybersecurity teams are essential to companies in order for companies to be successful. </p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/CMeyer_DataTheft.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/6/feed" method="post" id="fivestar-custom-widget--5" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--10" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Data Theft 1/5</option><option value="40">Give Data Theft 2/5</option><option value="60">Give Data Theft 3/5</option><option value="80">Give Data Theft 4/5</option><option value="100">Give Data Theft 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--5" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-AC7Fm11I6rj5xeQsY8SlplFUlJi8um0cfRLvCFbKy3s" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 01 May 2017 12:02:55 +0000 manager 463 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/05/01/data-theft#comments Advantages and Drawbacks to Using Biometric Authentication http://www.infosecwriters.com/articles/2017/04/21/advantages-and-drawbacks-using-biometric-authentication <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/finger.jpg?itok=5CcctYDM"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/finger.jpg?itok=5CcctYDM" width="300" height="300" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Stuart Hall</p> <p>As technology advances, so must the means of heightened information security. Corporate businesses, hospitals and your regular everyday people are relying more and more on technology for conducting business, transferring medical records, on-line banking and other everyday activities such as social medial. As the need for stronger information security arises new technology and means of authentication have been created. Multifactor authentication is a means of authenticating an individual using several different forms of authentication. Some use the term three-factor authentication. Three-factor authentication falls into these categories knowledge, possession, and inherence (Haughn, 2014). I consider this as something you know, something you have and something you are.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/SHall_Bio.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/6/feed" method="post" id="fivestar-custom-widget--6" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--12" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Advantages and Drawbacks to Using Biometric Authentication 1/5</option><option value="40">Give Advantages and Drawbacks to Using Biometric Authentication 2/5</option><option value="60">Give Advantages and Drawbacks to Using Biometric Authentication 3/5</option><option value="80">Give Advantages and Drawbacks to Using Biometric Authentication 4/5</option><option value="100" selected="selected">Give Advantages and Drawbacks to Using Biometric Authentication 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="average-rating">Average: <span >5</span></span> <span class="total-votes">(<span >1</span> vote)</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--6" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-teGGGn8CThGbLmLWZP2gEtiAMipizs5Em93CjaL8CCw" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Fri, 21 Apr 2017 13:52:25 +0000 manager 457 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/04/21/advantages-and-drawbacks-using-biometric-authentication#comments Open Stack & Open Source Software Vulnerabilities http://www.infosecwriters.com/articles/2017/04/18/open-stack-open-source-software-vulnerabilities <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/open.jpg?itok=yfJuKfBw"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/open.jpg?itok=yfJuKfBw" width="564" height="357" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Maxton Richardson</p> <p>Open Stack is an open source software technology that’s changing and developing the way we do business, but many are unaware of Open Stack technology. According to Business Wire, “The World Runs on Open Stack”. Open Stack is “Backed by some of the biggest companies in software development”. There are “Thousands of individual community members who support the growth, maintenance, &amp; development of Open Stack. Many big industries utilize Open Stack such as the Auto-Industry, media, finance, commerce, telecom, and energy. People all over the world use Open Stack daily, but very seldom people are aware of Open Stack technology. As stated by Opensource.com, “many think that Open Stack is the future of cloud computing.”</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/MRichardson_Open.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/6/feed" method="post" id="fivestar-custom-widget--7" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--14" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Open Stack &amp;amp; Open Source Software Vulnerabilities 1/5</option><option value="40">Give Open Stack &amp;amp; Open Source Software Vulnerabilities 2/5</option><option value="60">Give Open Stack &amp;amp; Open Source Software Vulnerabilities 3/5</option><option value="80">Give Open Stack &amp;amp; Open Source Software Vulnerabilities 4/5</option><option value="100">Give Open Stack &amp;amp; Open Source Software Vulnerabilities 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--7" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-eErTHug1RSDE4dHYsgy_HgJxJzYE1MFIPki1bo28f9I" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Tue, 18 Apr 2017 13:39:00 +0000 manager 454 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/04/18/open-stack-open-source-software-vulnerabilities#comments BITCOIN BASICS: Bitcoin Miners and their Role in Bitcoin’s Future http://www.infosecwriters.com/articles/2017/04/05/bitcoin-basics-bitcoin-miners-and-their-role-bitcoin%E2%80%99s-future <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/bitcoin.png?itok=jc_Uy-OT"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/bitcoin.png?itok=jc_Uy-OT" width="700" height="700" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Steve Ingram</p> <p>This paper covers some basics of Bitcoin and some of the issues and concerns that many raise about the role Bitcoin miners will play in the future of Bitcoin. Since the inception of Bitcoin in 2009, acceptance of the protocol has grown but there are many questions that must be answered. After doing research on this topic, I have a better understanding of the Bitcoin protocol, but, I still have doubts that it will be universally excepted in the future. Bitcoin mining could be a major factor in its success. This paper is not meant to promote or criticize Bitcoin, but challenge the reader on the concept of Bitcoin mining as a viable solution for validating bitcoin transactions into the ledger system. These questions must be addressed if Bitcoin is to survive in the 21st century.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/singram_Bitcoin.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/6/feed" method="post" id="fivestar-custom-widget--8" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--16" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give BITCOIN BASICS: Bitcoin Miners and their Role in Bitcoin’s Future 1/5</option><option value="40">Give BITCOIN BASICS: Bitcoin Miners and their Role in Bitcoin’s Future 2/5</option><option value="60">Give BITCOIN BASICS: Bitcoin Miners and their Role in Bitcoin’s Future 3/5</option><option value="80">Give BITCOIN BASICS: Bitcoin Miners and their Role in Bitcoin’s Future 4/5</option><option value="100">Give BITCOIN BASICS: Bitcoin Miners and their Role in Bitcoin’s Future 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--8" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-AyjulyrdyNUPcdNwPhEdwjryNO9Ciy6IjCWLmhdH7Xw" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Wed, 05 Apr 2017 15:09:15 +0000 manager 449 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/04/05/bitcoin-basics-bitcoin-miners-and-their-role-bitcoin%E2%80%99s-future#comments Understanding Phishing and Protecting the 8th Layer http://www.infosecwriters.com/articles/2017/02/06/understanding-phishing-and-protecting-8th-layer <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/fish.jpg?itok=qPGtp7yG"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/fish.jpg?itok=qPGtp7yG" width="360" height="264" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Anthony Ralston</p> <p>This paper will focus on understanding the risk associated with phishing attacks on companies and how we can measure growth through phish benchmarking. The paper will define and look at the different angles that phishes can exploit users and how we can measure their effectiveness. The paper will look at the traditional measurements matrix based on clicks and credential harvesting. Moreover, this paper will look at cultural, quality of phish, work environment, and other factors to establish a larger picture of the risk to a company from phishing attacks. It is hoped that this paper will serve as a closer consideration what it takes to measure and protect users from phishing attacks.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/aralston_Phish.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/6/feed" method="post" id="fivestar-custom-widget--9" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--18" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Understanding Phishing and Protecting the 8th Layer 1/5</option><option value="40">Give Understanding Phishing and Protecting the 8th Layer 2/5</option><option value="60">Give Understanding Phishing and Protecting the 8th Layer 3/5</option><option value="80">Give Understanding Phishing and Protecting the 8th Layer 4/5</option><option value="100" selected="selected">Give Understanding Phishing and Protecting the 8th Layer 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="average-rating">Average: <span >5</span></span> <span class="total-votes">(<span >1</span> vote)</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--9" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-nBbzi3I5pSmaNGsf83xOKJ_u550CT6SPGWIHCUMv4m8" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 06 Feb 2017 16:25:51 +0000 manager 443 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/02/06/understanding-phishing-and-protecting-8th-layer#comments Securing Access Using Different Types of User Authentication http://www.infosecwriters.com/articles/2017/01/27/securing-access-using-different-types-user-authentication <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/ua.jpg?itok=3GppqkT5"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/ua.jpg?itok=3GppqkT5" width="348" height="234" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Ann Funk</p> <p>Everyone in this day and age interacts with a computer in some form or another. These computers can take the form of ATM’s, Gas Pumps, laptops, and even watches. The one thing they all have in common is that they store or access our personal data. In this paper, we will discuss the ways that this data is secured by the use of User Authentication. We will begin by talking a little about the different types of user authentication and how it is used. Giving a little insight into the positives of each method and even giving some information about the challenges of each method allowing the user to decide exactly which method is right for them.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/AFunk_UserAuth.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/6/feed" method="post" id="fivestar-custom-widget--10" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--20" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Securing Access Using Different Types of User Authentication 1/5</option><option value="40">Give Securing Access Using Different Types of User Authentication 2/5</option><option value="60">Give Securing Access Using Different Types of User Authentication 3/5</option><option value="80">Give Securing Access Using Different Types of User Authentication 4/5</option><option value="100">Give Securing Access Using Different Types of User Authentication 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--10" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-ZKLhL0sk381xTnfaK0jUd_8dhSNuMQOdK6E8ZwVi7OM" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Fri, 27 Jan 2017 13:38:40 +0000 manager 441 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/01/27/securing-access-using-different-types-user-authentication#comments