Misc Security
Which of these security strategies: Biometric, certificates, non text passwords and signatures would best keep confidential and sensitive information safe? With increasing security breaches, threats and sophistication on the part of the attackers, which among these four (Biometric, certificates, non text passwords and signatures) should be used for organization protection?
- 818 views
- 2 answers
- 0 votes
Can phone home access restriction be used without internet connection? I tried to use phone home to restrict user in some system app without internet connectivity. The idea is to prevent any user without internet access from using most of the functionality of the app. I have tried some approach but the result is not what I desire. Is the idea feasible? What other approach can I use to achieve this idea?
- 587 views
- 1 answers
- 0 votes
How secure is Apple pay and Google wallet? With many merchants and stores accepting Apple pay and Google wallet, what should I be concerned with about using either of the two for payment? Can unauthorized transaction be performed with the two without the one using Google wallet or Apple pay knowing? How long are the data collected by the merchant stored on their server?
- 545 views
- 1 answers
- 0 votes
How secure is multifactor password authentication? With the recent J P Morgan chase penetration, no matter how long a password it, it won’t protect you. Also personal privacy is at all-time low. What algorithm does the multifactor password authentication uses? What differentiates multifactor password authentication from the traditional password form?
- 516 views
- 1 answers
- 0 votes
What is the best, easy to use, economical protection strategy against ‘Stingray’ surveillance system? How can someone know if Stingray or any controversial surveillance system is collecting personal and sensitive record on a cell phone or any other radio devices? What distinctive features should one look out for in an area that one suspect of some clandestine surveillance activity is going on?
- 600 views
- 1 answers
- 0 votes
What are the vulnerabilities of cloud computing? By the way individual and large corporations are seriously embracing cloud computing and virtualization, which is more susceptible to attacks, how do we guide against the attacks or threats? What are the latest cloud computing security breakthroughs that is giving hackers a sleepless night?
- 463 views
- 1 answers
- 0 votes
What is the best approach to Near Field Communication (NFC)? With many devices, tablets, smart phone, etc. now equipped with near field communication, how secure are the data collected by these NFC enabled devices? What are the data collected? Where are these data stored? How secure are the data where they are stored?
- 564 views
- 1 answers
- 0 votes
What are the differences between one time password (OTP) and security tokens? Is it true that some tokens work as hardware OTP? Which of the two implements a cryptographic challenge response authentication? Can an attacker remotely made an unauthorized transaction while someone is using OTP? are the two part of multilevel authentication?
- 534 views
- 1 answers
- 0 votes
Recently I have been experiencing the problem of someone accessing my Facebook account again and again. I have the mobile code feature on in which you have to enter code from your mobile so the person is not able to open my account. But I have to keep on changing the password and it is very annoying. What can I do to stop this? Does Facebook have any additional security features?
- 621 views
- 2 answers
- 0 votes
Several disaster striking virus like the Shamoon , Flame etc have targeted the energy sector and have caused crippling consequences. What could be a risk management strategy for such critical industries to ensure that there is better defense strategy in place in case of future attacks? Can we eliminate zero day attacks such as the ones above? |
- 584 views
- 1 answers
- 0 votes