Skip to main content

Home/ Groups/ CSIA 459
Marie Arrington

Cloud Compliance: Tackling Compliance in the Cloud - 0 views

  •  
    Most organizations already have started to use virtualization technology or cloud computing. Yet some still may be reluctant to move their mission-critical-tier-1 - applications to these relatively new environments. While the flexibility and cost benefits of virtualization are widely accepted, questions linger on how to adapt to new and different risks.
Joseph Deleon

Applying security policies and service level agreement to IaaS service model to enhanc... - 0 views

  •  
    Great Resource no Cloud computing and a bit more technical.
Joseph Deleon

Cloud computing and collaboration - 0 views

  •  
    Takes a different perspective about cloud services and how to incorporate them.
Joseph Deleon

Cyber War 2.0 -- Russia v. Georgia - 0 views

  •  
    Fun article about the cyber side of the 2008 conflict, good read.
Bob Lloyd

Intelligent 'iKnife' diagnoses cancer midsurgery | Cutting Edge - CNET News - 1 views

  •  
    This article is about an intelligent knife that allows surgeons to minimize bleeding during operations but also has a mass spectrometer that analyzes chemicals when cutting. The knife has the potential to reduce tumor recurrence.
  •  
    I had read this article on the Internet and found this an amazing use of the technology. The ability to determine if an entire tumor is removed at the time it's being done eliminates risk for the patient and waiting for lab results.
Cheryl Hoffman

Phone hackers a threat to safety - 0 views

  •  
    Interesting article on how a hospitals phone network was hacked by someone using VOIP who then performed a DOS attack.
  •  
    This was an interesting article. I wish it explained how the attack was carried out. I am surprised that firewalls would not be a part of VOIP installation for large institutions. The treat has always been there. I am guessing that somebody cut costs up front and paid for it later. Maybe the attacker sold them the firewalls?
Lee Bry

Cyber Threat: On the Front Lines with Shawn Henry - 3 views

  •  
    Our departing top cyber official reflects on how the FBI has adapted to an evolving threat. Shawn Henry is executive assistant director of the FBI's Criminal, Cyber, Response, and Services Branch. He served as assistant director of the Cyber Division from September 2008 to January 2010, Note: Shawn Henry retired from the FBI on March 31, 2012. This is an excellent interview with Shawn Henry describing todays cyber actors
  •  
    This is a good article. I though the FBI was smart in having IT people trained to be agents as apposed to the reverse.
Rumnea Kelly

Twitter and New York Times clash with hackers for control of their sites - 1 views

  •  
    Remember our discussion about DNS being tough to compromise? :D
Joseph Deleon

Exploring Bring Your Own Device In the Public Sector - 0 views

  •  
    Great article that covers the basics of BYOD and the issues this concept introduces.
Joseph Walbert

Cyber Modeling (4 of 5) - 0 views

  •  
    Queuing Model for Malicious Attack Detection.
Joseph Walbert

Cyber Modeling (5 of 5) - 0 views

  •  
    Game Theoretic Solutions to Cyber Attack and Network Defense Problems
cpanagopulos

Status - mobile wallets utilizing near field communication (NFC) technology. - 1 views

  •  
    This publication outlines the various companies that are offering "mobile wallets" as a payment option. The authors describe Google and Visa as leading the industry as companies who are leading the way with NFC technology implementation. Also discussed is state of acquisitions between the major credit companies and competing mobile wallet platforms.
cpanagopulos

Near Field Communication (NFC) - 1 views

  •  
    The authors of this publication describe the technology behind NFC, the various applications for NFC, and the devices that are currently, or have the potential to be, NFC enabled.
cpanagopulos

Mobile near field communications: tap n' go, keep it secure and private - 1 views

  •  
    This publication focuses on the security risks of NFC technology. Also discussed are the methods being developed to mitigate these risks.
cpanagopulos

Defining business models for near-field communication payments - 1 views

  •  
    This publication discusses the necessary factors involved in making the mass use of NFC technology a reality.
cpanagopulos

Near field communication: Transforming transactions - 2 views

  •  
    This publication describes the various applications and the future possibilities of Near Field Communication in the mobile market.
Alexandr Yezersky

This Malicious Charger Can Hack Your iPhone | Diigo - 0 views

  •  
    This article describes the device created by a Georgia Research team, known as Mactans that hacks iPhones through a compatible charger.
Joseph Walbert

Cyber Modeling (3 of 5) - 0 views

  •  
    The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions.
Joseph Walbert

Cyber Modeling (2 of 5) - 0 views

  •  
    School studies Net attacks.
« First ‹ Previous 121 - 140 Next › Last »
Showing 20 items per page