Wednesday, September 2, 2015
Posted by manager
Reader's rate:
0
Contributed by Lamaris Davis Securing EHR’s continue to be a huge problem for all health care organizations. The security of this highly sensitive information will continue to be a short and long term goal for every organization that deals with healthcare information. Authentication of the... + continue reading
Tuesday, September 1, 2015
Posted by manager
Reader's rate:
0
Contributed by Charles Hornat This paper outlines some of the many IT security issues I have witnessed when taking over hotel/resort IT and security. These security lapses often times leave guest information free and open for the taking, usually requiring little to no effort to obtain. In my... + continue reading
Tuesday, September 1, 2015
Posted by manager
Reader's rate:
0
Contributed by Aditya K Sood This paper delineates the anti circumventory paradox of Leeching. This matrix co-persists with the attackers and protectors. Leeching is derived from an animal Leech, that is a parasite which nourishes itself from other resources. The same case occurs when an... + continue reading
Monday, August 31, 2015
Posted by manager
Reader's rate:
0
Contributed by Michael Davis The growing world of big data presents many interrelated ethical concerns in a business environment. These concerns touch a broad spectrum of ethical concerns including the legal, moral, financial, and social impacts of ethical planning and decision making in... + continue reading
Monday, August 31, 2015
Posted by manager
Reader's rate:
0
Contributed by Mark Lewis Industrial control systems (ICS) help run a large part of our nation’s critical infrastructure and industrial processes. The compromise of ICSs can have substantial negative impacts on our nation’s security, health, environment, and economy. Although we have been using... + continue reading

Home Page

Featured Articles

Tuesday, 01/09/15 - 0 comment(s)
Contributed by Charles Hornat This paper outlines some of the many IT security issues I have witnessed when taking over hotel/resort IT and security. These security lapses often times leave guest information free and open for the taking, usually requiring little to no effort to obtain. In my company’s experience (over a decade) of supporting... + continue reading
Monday, 31/08/15 - 0 comment(s)
Contributed by Michael Davis The growing world of big data presents many interrelated ethical concerns in a business environment. These concerns touch a broad spectrum of ethical concerns including the legal, moral, financial, and social impacts of ethical planning and decision making in emerging situations of data analytics and privacy. As... + continue reading

Red Tape

209
reads
209 today
Wednesday, 02/09/15 - 0 comment(s)
Contributed by Lamaris Davis Securing EHR’s continue to be a huge problem for all health care organizations. The security of this highly sensitive information will continue to be a short and long... + continue reading

Cryptography

283
reads
15 today
Monday, 31/08/15 - 0 comment(s)
Contributed by Roberto Larcher This paper explains how it is often possible, with the simple substitution of a string, to get around a "secure" implementation based on an incorrect use of SSL.... + continue reading

Exploitation

83
reads
30 today
Tuesday, 01/09/15 - 0 comment(s)
Contributed by Aditya K Sood This paper delineates the anti circumventory paradox of Leeching. This matrix co-persists with the attackers and protectors. Leeching is derived from an animal Leech,... + continue reading

Sistema

486
reads
49 today
Thursday, 27/08/15 - 0 comment(s)
Contributed by Anoop MS The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an... + continue reading

Et Cetera

240
reads
53 today
Tuesday, 01/09/15 - 0 comment(s)
Contributed by Charles Hornat This paper outlines some of the many IT security issues I have witnessed when taking over hotel/resort IT and security. These security lapses often times leave guest... + continue reading

Recommended Reading

953
reads
14 today
Thursday, 30/07/15 - 0 comment(s)
This book was written by Mary Ellen O'Toole, PH.D. and Alisa Bowman. Taken from her web site "Dr. O’Toole also worked the Elizabeth Smart and Natalee Holloway disappearances, the Columbine... + continue reading