Skip to main content

Home/ Groups/ CSIA 459
1More

Cloud Compliance: Tackling Compliance in the Cloud - 0 views

  •  
    Most organizations already have started to use virtualization technology or cloud computing. Yet some still may be reluctant to move their mission-critical-tier-1 - applications to these relatively new environments. While the flexibility and cost benefits of virtualization are widely accepted, questions linger on how to adapt to new and different risks.
1More

Applying security policies and service level agreement to IaaS service model to enhanc... - 0 views

  •  
    Great Resource no Cloud computing and a bit more technical.
1More

Cloud computing and collaboration - 0 views

  •  
    Takes a different perspective about cloud services and how to incorporate them.
1More

Cyber War 2.0 -- Russia v. Georgia - 0 views

  •  
    Fun article about the cyber side of the 2008 conflict, good read.
2More

Intelligent 'iKnife' diagnoses cancer midsurgery | Cutting Edge - CNET News - 1 views

  •  
    This article is about an intelligent knife that allows surgeons to minimize bleeding during operations but also has a mass spectrometer that analyzes chemicals when cutting. The knife has the potential to reduce tumor recurrence.
  •  
    I had read this article on the Internet and found this an amazing use of the technology. The ability to determine if an entire tumor is removed at the time it's being done eliminates risk for the patient and waiting for lab results.
2More

Phone hackers a threat to safety - 0 views

  •  
    Interesting article on how a hospitals phone network was hacked by someone using VOIP who then performed a DOS attack.
  •  
    This was an interesting article. I wish it explained how the attack was carried out. I am surprised that firewalls would not be a part of VOIP installation for large institutions. The treat has always been there. I am guessing that somebody cut costs up front and paid for it later. Maybe the attacker sold them the firewalls?
2More

Cyber Threat: On the Front Lines with Shawn Henry - 3 views

  •  
    Our departing top cyber official reflects on how the FBI has adapted to an evolving threat. Shawn Henry is executive assistant director of the FBI's Criminal, Cyber, Response, and Services Branch. He served as assistant director of the Cyber Division from September 2008 to January 2010, Note: Shawn Henry retired from the FBI on March 31, 2012. This is an excellent interview with Shawn Henry describing todays cyber actors
  •  
    This is a good article. I though the FBI was smart in having IT people trained to be agents as apposed to the reverse.
1More

Twitter and New York Times clash with hackers for control of their sites - 1 views

  •  
    Remember our discussion about DNS being tough to compromise? :D
1More

Exploring Bring Your Own Device In the Public Sector - 0 views

  •  
    Great article that covers the basics of BYOD and the issues this concept introduces.
1More

Cyber Modeling (4 of 5) - 0 views

  •  
    Queuing Model for Malicious Attack Detection.
1More

Cyber Modeling (5 of 5) - 0 views

  •  
    Game Theoretic Solutions to Cyber Attack and Network Defense Problems
1More

Status - mobile wallets utilizing near field communication (NFC) technology. - 1 views

  •  
    This publication outlines the various companies that are offering "mobile wallets" as a payment option. The authors describe Google and Visa as leading the industry as companies who are leading the way with NFC technology implementation. Also discussed is state of acquisitions between the major credit companies and competing mobile wallet platforms.
1More

Near Field Communication (NFC) - 1 views

  •  
    The authors of this publication describe the technology behind NFC, the various applications for NFC, and the devices that are currently, or have the potential to be, NFC enabled.
1More

Mobile near field communications: tap n' go, keep it secure and private - 1 views

  •  
    This publication focuses on the security risks of NFC technology. Also discussed are the methods being developed to mitigate these risks.
1More

Defining business models for near-field communication payments - 1 views

  •  
    This publication discusses the necessary factors involved in making the mass use of NFC technology a reality.
1More

Near field communication: Transforming transactions - 2 views

  •  
    This publication describes the various applications and the future possibilities of Near Field Communication in the mobile market.
1More

This Malicious Charger Can Hack Your iPhone | Diigo - 0 views

  •  
    This article describes the device created by a Georgia Research team, known as Mactans that hacks iPhones through a compatible charger.
1More

Cyber Modeling (3 of 5) - 0 views

  •  
    The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions.
1More

Cyber Modeling (2 of 5) - 0 views

  •  
    School studies Net attacks.
« First ‹ Previous 121 - 140 Next › Last »
Showing 20 items per page