Ten Years of Academic Writing

Why can’t encryption be impenetrable?

Why can’t encryption be impenetrable?

Vincent Triola

Encryption is highly effective when protecting data across networks and the internet. Most encryption falls under two forms including symmetric key encryption and public key encryption.

Why can’t encryption be impenetrable?

Vincent Triola

Encryption is highly effective when protecting data across networks and the internet. Most encryption falls under two forms including symmetric key encryption and public key encryption.

Database Privacy Issues

Database Privacy Issues

Vincent Triola

Database privacy is a serious issue because it can violate confidentiality and or release sensitive data into the wrong hands. This problem occurs as a result of rules in the...

Database Privacy Issues

Vincent Triola

Database privacy is a serious issue because it can violate confidentiality and or release sensitive data into the wrong hands. This problem occurs as a result of rules in the...

What was Stuxnet?

What was Stuxnet?

Vincent Triola

The article “Stuxnet: Dissecting a Cyberwarfare Weapon Cyberspace” describes a new vulnerability of hardware was exposed that could severely impact the risks to network infrastructure.

What was Stuxnet?

Vincent Triola

The article “Stuxnet: Dissecting a Cyberwarfare Weapon Cyberspace” describes a new vulnerability of hardware was exposed that could severely impact the risks to network infrastructure.

FedRAMP

FedRAMP’s Cloud Security Assessment Process

Vincent Triola

The Federal Risk and Authorization Management Program (FedRAMP) was formed to provide standards for the authorization and assessing of cloud services and products from government and agency usage.

FedRAMP’s Cloud Security Assessment Process

Vincent Triola

The Federal Risk and Authorization Management Program (FedRAMP) was formed to provide standards for the authorization and assessing of cloud services and products from government and agency usage.

Internet of Things (IoT)

Internet of Things (IoT)

Vincent Triola

The Internet of Things (IoT) refers to the networking of physical devices using a variety of software, electronics, and networking connectivity to collect and share data. The IoT has grown...

Internet of Things (IoT)

Vincent Triola

The Internet of Things (IoT) refers to the networking of physical devices using a variety of software, electronics, and networking connectivity to collect and share data. The IoT has grown...

Data Link Layer Attacks

Data Link Layer Attacks

Vincent Triola

The data link layer, layer 2, forms the second layer of Open Systems Interconnection model (OSI) of computer networking, which is comprised of seven-layers.

Data Link Layer Attacks

Vincent Triola

The data link layer, layer 2, forms the second layer of Open Systems Interconnection model (OSI) of computer networking, which is comprised of seven-layers.