Quantcast
Channel: InfoSecWriters.com - Red Tape
Browsing all 50 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Best Practices, Procedures and Methods for Access Control Management

Contributed by Michael HaythornControlling access to information and information systems is a fundamental responsibility of information security professionals. The basic need to consume data creates a...

View Article


Image may be NSFW.
Clik here to view.

The Effect of Compliance on Database Integrity, Security and Administration

Contributed by Patti JessupThe dawn of the 21st century saw advances in technology that allowed consumers and businesses to communicate and complete routine and complex transactions using a new vehicle...

View Article


Image may be NSFW.
Clik here to view.

Effective Controls for Attaining Continuous Application Security Throughout

Contributed by Caleb Sima and Vincent LiuGiven the choice, every organization would want secure Web sites and applications from the Web application development phase all the way through the software...

View Article

Image may be NSFW.
Clik here to view.

Information Security Career Planning: Education, Training and the Role of...

Contributed by Ken NewmanPART 2 of 2: Regardless of options, there are some key elements that should be present in any form of education in order to provide lasting value to the information security...

View Article

Image may be NSFW.
Clik here to view.

Advanced Persistent Threats: What Are They and Why Do I care

Contributed by Bryant RossilMy term paper will focus on the protection of the enterprise against the business directed cybercrimes, Advanced Persistent Threats (APT). This paper will define what an APT...

View Article


Image may be NSFW.
Clik here to view.

Maintaining a Secure Network in an Educational Environment

Contributed by Larry Jackson Jr.In this paper I will discuss the network security issues associated with securing school networks and the common methods of minimizing risks. I will focus on security...

View Article

Image may be NSFW.
Clik here to view.

Check Your Digital Baggage

Contributed by Eric A. Simmons These days one would be hard pressed to find lucrative employment with a company that is not, to some extent, international. In order to maintain connections and...

View Article

Image may be NSFW.
Clik here to view.

Five Mistakes of Incident Response

Contributed by Dr. Anton ChuvakinAll organizations have to care about security incident response! Unlike detection and prevention, the response is impossible to avoid. While it is not uncommon for the...

View Article


Image may be NSFW.
Clik here to view.

Security Synergy

Contributed by David BalabanUnity is power. It's a simple lesson, power and strength come from unity. But for information security, we haven't quite learned this lesson yet. It's not that we're not...

View Article


Image may be NSFW.
Clik here to view.

Social Media Vulnerabilities and Considerations for the Corporate Environment

Contributed by Rob HornbuckleSocial networking is now one of the most dangerous security threats to an organization, according to recent studies by well-respected security firms such as Gartner,...

View Article

Image may be NSFW.
Clik here to view.

Understanding USB Flash Drives as Portable Infrastructure

Contributed by Ray ChanceThe purpose of this white paper is to briefly discuss seven important topics everyone in business needs to know about USB flash drives. More importantly, this white paper is...

View Article

Image may be NSFW.
Clik here to view.

Regulations to Reduce Data Breaches

Contributed by David MitchellOver the past years there have been targeted data breaches that affected many large corporation and even the federal government. Target store and Office of Personnel...

View Article

Image may be NSFW.
Clik here to view.

Legal Issues of Data Held Hostage

Contributed by Robert UnderwoodData held hostage has become a recent technology trend with computers and with these types of attacks in which crooks take a victim’s data and hold it for ransom...

View Article


Image may be NSFW.
Clik here to view.

Privacy and Government Surveillance

Contributed by David W. MitchellFederal government’s broad powers to act for public safety and national security are limited by the First Amendment and Fourth Amendment. The 9/11 attack have open the...

View Article

Image may be NSFW.
Clik here to view.

Better Passwords and Policies

Contributed by David Patten Everyday press releases cover information security breaches from many top companies. Often these breaches include releasing the passwords that were stolen. Sadly, these...

View Article


Image may be NSFW.
Clik here to view.

Incident Response Planning In Industrial Control Systems

Contributed by Bill ClarkThis paper discusses what Incident Response (IR) Planning is, what Industrial Control Systems (ICS) are, and how IR Planning pertains to ICS security. IR Planning is the...

View Article

Image may be NSFW.
Clik here to view.

Risk Management for Healthcare Systems

Contributed by Lamaris DavisThe responsibility of risk management in healthcare systems falls on multiple individuals within any given organization. It’s well known that most hospitals and healthcare...

View Article


Image may be NSFW.
Clik here to view.

PCI and Why it is Important

Contributed by Michael MozingoMillions of credit and debit card transactions are completed daily. Credit and debit card usage is steadily increasing, and with it, so is the treat of fraud. With the...

View Article

Image may be NSFW.
Clik here to view.

Best Practices for Implementing Access Control Systems

Contributed by Isaac McGuireAs a network administrator or information security specialist, you might find yourself wondering if your network is safe. You are constantly asking yourself, “What can I do...

View Article

Image may be NSFW.
Clik here to view.

Privacy Concerns in Modern America

Contributed by Reverend Jerry L Cason Jr.The fourth amendment to the constitution promised the right to privacy for every American citizen. Protections were put in place to help ensure these rights...

View Article
Browsing all 50 articles
Browse latest View live


Latest Images