Skip to main content

Home/ Groups/ CSIA 459
Joseph Deleon

BYOD security challenges: control and protect your most sensitive data - 0 views

  •  
    General BYOD information, more data/information focused.
Christopher Salinas

Writing the Book in DNA - 0 views

  •  
    Date: Using next-generation sequencing technology and a novel strategy to encode 1,000 times the largest data size previously achieved in DNA, Harvard geneticist encodes his book in life's language There are currently 70 billion copies of the forthcoming book, Regenesis, all stored in the form of DNA.
Christopher Salinas

Rewritable digital data storage in live cells via engineered control of recombination d... - 0 views

  •  
    Department of Bioengineering, Room 269B, Y2E2 Building, 473 Via Ortega, Stanford University, Stanford, CA 94305 Edited by David Baker, University of Washington, Seattle, WA, and approved April 6, 2012 (received for review February 8, 2012) Abstract The use of synthetic biological systems in research, healthcare, and manufacturing often requires autonomous history-dependent behavior and therefore some form of engineered biological memory.
Christopher Salinas

DNA goes digital - 2 views

  •  
    This makes complete sense to me but seems like something in a science fiction book. The ability to put mankind's years worth of data on a few grams of DNA seems far reaching to me but interesting all the same.
Marie Arrington

Cloud Computing Explained - 0 views

  •  
    This was a simple video that broke down cloud computing to its simplest form. I liked how it explained the billing and information use of the concept.
Marie Arrington

Cloud Computer Security - 0 views

  •  
    This is great explanation of security threats associated with cloud computing on the 3 available options in cloud computing: Infrastructure, Platform & Application.
Amy Harding

CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Mo... - 7 views

  •  
    For Week 6
Amy Harding

Verizon 2013 Data Breach Invesitations Report - 6 views

  •  
    For your Week 6 discussions. This is the actual report. The other bookmark takes you to an article about the report.
Rumnea Kelly

Celebrated Computer Hacker Barnaby Jack Dies - 1 views

  •  
    Interesting story that I'm sure some of you are already aware.
  •  
    I was going to post this as well. I have done a number of projects on body sensors ad telemedicine that pointed out the type of vulnerabilities he said he could exploit up to the point of death. I sad story.
Bob Lloyd

Symantec Control Compliance Suite v11 product review | SC Magazine - 0 views

  •  
    Interesting product on control compliance software.
  •  
    Eh, I like VMWare VCM or McAfee's HBSS (kind of a nightmare to set up though.)
Lee Bry

Hack an iPhone in 60 seconds - 1 views

  •  
    Check this out. Just when you think it's safe to go into the water!
Amy Harding

Big Ideas Big Data - 1 views

shared by Amy Harding on 05 Aug 13 - No Cached
  •  
    This video is for your week 7 discussion.
Amy Harding

What is IPv6? - 3 views

shared by Amy Harding on 05 Aug 13 - No Cached
  •  
    This video is for your week 7 discussion.
sarahterry

Step into the BREACH: HTTPS encrypted web cracked in 30 seconds - 0 views

http://www.theregister.co.uk/2013/08/02/breach_crypto_attack/

started by sarahterry on 07 Aug 13 no follow-up yet
Cheryl Hoffman

Car hackers 'drive' car with laptop - 1 views

  •  
    Next time you have a passenger in the back seat of your car offering infuriatingly "helpful" advice about your driving skills, count yourself lucky that they aren't doing anything more sinister in their attempts to guide your vehicle.
  •  
    I was quite amused by the picture of the man holding the Nintendo controller in the car on the front page of the article. It doesn't surprise me that a cars ECU can be manipulated. They are programmed to control specific tasks and are not complex nor secure. Most of the information they display and/or process is from various sensors within the engine or chassis. If the failure of important sensors occur, you may not even be able to start your car. It's a fragile system, although it was designed that way for safety, not system security.
Cheryl Hoffman

Five Charged in Largest Hacking Scheme Ever Prosecuted in US | SecurityWeek.Com - 0 views

  •  
    The U.S. Attorney's Office today unsealed an indictment charging four Russians and a Ukrainian with a multi-million hacking scheme that netted 160 million credit card numbers from several major American and international corporations.
Bob Lloyd

3D-printed button-bashing robot guesses phone PINs | Cutting Edge - CNET News - 1 views

  •  
    I thought this was interesting. Hacking has gone to another level of automation by using robotics to brute force hack the 4 digit pin on cell phones.
  •  
    It's nice to know my first thought when I started reading this of locking the phone after X number of unsuccessful attempts is what they suggested.
Marie Arrington

Six security issues to tackle before encrypting cloud data - 1 views

  •  
    Concern about security and privacy in the cloud will drive adoption of cloud encryption systems, but Gartner warns there are six security issues that businesses should tackle. The expected compound annual growth rate of software as a service (SaaS) from 2011 to 2016 is 19.5%, platform as a service (PaaS) 27.7%, infrastructure as a service (IaaS) 41.3% and security services spending 22%.
« First ‹ Previous 101 - 120 Next › Last »
Showing 20 items per page