Ten Years of Academic Writing

What was Stuxnet?

What was Stuxnet?

Vincent Triola

The article “Stuxnet: Dissecting a Cyberwarfare Weapon Cyberspace” describes a new vulnerability of hardware was exposed that could severely impact the risks to network infrastructure.

What was Stuxnet?

Vincent Triola

The article “Stuxnet: Dissecting a Cyberwarfare Weapon Cyberspace” describes a new vulnerability of hardware was exposed that could severely impact the risks to network infrastructure.

What is Public Key Encryption?

What is Public Key Encryption?

Vincent Triola

Public key encryption uses a popular algorithm known as RSA (Rivest–Shamir–Adleman). This algorithm was one of the first practical public key encryption systems used for transmitting data.

What is Public Key Encryption?

Vincent Triola

Public key encryption uses a popular algorithm known as RSA (Rivest–Shamir–Adleman). This algorithm was one of the first practical public key encryption systems used for transmitting data.

FedRAMP

FedRAMP’s Cloud Security Assessment Process

Vincent Triola

The Federal Risk and Authorization Management Program (FedRAMP) was formed to provide standards for the authorization and assessing of cloud services and products from government and agency usage.

FedRAMP’s Cloud Security Assessment Process

Vincent Triola

The Federal Risk and Authorization Management Program (FedRAMP) was formed to provide standards for the authorization and assessing of cloud services and products from government and agency usage.

Internet of Things (IoT)

Internet of Things (IoT)

Vincent Triola

The Internet of Things (IoT) refers to the networking of physical devices using a variety of software, electronics, and networking connectivity to collect and share data. The IoT has grown...

Internet of Things (IoT)

Vincent Triola

The Internet of Things (IoT) refers to the networking of physical devices using a variety of software, electronics, and networking connectivity to collect and share data. The IoT has grown...

Globalization Threatens Hospitality Companies with Data Theft & Hacking

Globalization Threatens Hospitality Companies w...

Vincent Triola

Who would mount a cyber-attack on a hotel or hack the computer system? Hackers. Hackers see opportunities where no one else sees them and black hats and white hats provide...

Globalization Threatens Hospitality Companies w...

Vincent Triola

Who would mount a cyber-attack on a hotel or hack the computer system? Hackers. Hackers see opportunities where no one else sees them and black hats and white hats provide...

The CIA Security Triad isn’t solely about balancing network security.

The CIA Security Triad isn’t solely about balan...

Vincent Triola

One might think that CIA is a balance of elements that allow for maximization of user ability and security. This might be true but this balancing act is really an...

The CIA Security Triad isn’t solely about balan...

Vincent Triola

One might think that CIA is a balance of elements that allow for maximization of user ability and security. This might be true but this balancing act is really an...