4 research outputs found
Recommended from our members
An End User\u27s Model for Communications Technologies in The Twenty First Century
This paper presents an end user\u27s model for understanding the use of communications technology or media in the 21st century. The rapid advancement of communications technologies like Email, Group Decision Support System and Video Conferencing are not being taken advantage of today. A model is presented and then explained in terms of the existing technology. A review of the literamre is provided at each step of the way. A table summarizes the information reviewed
Recommended from our members
Discovering a Joomla Exploit for Possible Malware: Social Engineering and a PHP BASE64 GIF Exploit
his article discusses the importance of Joomla as a Content Management System that is used by 2.7% of the web and how a possible new malware exploit has been discovered. The PHP BASE64 malware exploit is a well-documented exploit of PHP but the implementation of this exploit as it relates to Joomla is a very ingenious method not previously used before, as far as the authors were able to discover. In this particularly case, PHP code is embedded in a GIF file to produce a very sophisticated and unique malware exploit to Joomla
Recommended from our members
Enterprise Content Management: Understanding the Taxonomy
In an effort to understand content, its taxonomy and management, we define content management as the process of managing the creation, categorization, delivery and archiving of content in which workflow and business processes are maximized. Built upon what industry experts have to offer about enterprise content taxonomy, we have enacted a framework to better understand, create and manage enterprise taxonomies. This framework will be able to integrate rich content, modern computing technology, advanced analytics, automated worlflow, business requirements and human resources into a process where companies can easily manage their information for decision making and gaining competitive advantages
Recommended from our members
Developing a Metrics Framework for the Federal Government in Computer Security Incident Response
As technology advances and society becomes more dependent on information technology (IT), the exposure to vulnerabilities and threats increases. These threats pertain to industry as well as government information systems. There is, however, a lack in how we measure the performance and create accountability for computer security incident response (CSIR) capabilities. Many government organizations still struggle to determine what security metrics to use and how to find value within these metrics. To fill this apparent gap, a metrics framework has been developed for incident response to serve as an internal analysis, supporting continuous improvement in incident reporting and strengthening the security posture for an organization’s mission. The goal of this metrics framework for CSIR aims to provide a holistic approach towards security metrics, which is specific to incident reporting and promotes efforts of more practical and clear guidelines on measuring the computer security incident response team (CSIRT). An additional benefit to this project is that it provides middle management with a framework for measuring the results of incident reporting in a CSIR program