Create an Account
username: password:
 
  MemeStreams Logo

What questions are you asking yourself?

search

Jeremy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Jeremy's topics
Arts
  Literature
   Classical
   Fiction
   Horror
   Non-Fiction
   Sci-Fi/Fantasy Literature
  Movies
   Movie Genres
    Action/Adventure
    Cult Films
    Documentary
    Drama
    Horror
    Independent Films
    Film Noir
    Sci-Fi/Fantasy Films
    War
  Music
   Music Styles
    Classical
    Electronic Music
    Rap & Hip Hop
    IDM
    Jazz
    World Music
  TV
   TV Documentary
   TV Drama
   SciFi TV
Business
  Finance & Accounting
  Industries
   Tech Industry
   Telecom Industry
  Management
  Markets & Investing
Games
  Video Games
   PC Video Games
   Console Video Games
Health and Wellness
  Medicine
Home and Garden
  Cooking
  Entertaining
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   California
    SF Bay Area
   Events in Washington D.C.
   News for Washington D.C.
   Georgia
    Atlanta
     Atlanta Events
Science
  Biology
  History
  Math
  Medicine
  Nano Tech
  Physics
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Technology
  Biotechnology
  Computers
   (Computer Security)
    Cryptography
   PC Hardware
   Human Computer Interaction
   Computer Networking
   Macintosh
   Software Development
    Open Source Development
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

Feds Building Internet Monitoring Center
Topic: Computer Security 1:27 am EST, Feb  3, 2003

The Bush administration is quietly assembling an Internet-wide monitoring center to detect and respond to attacks on vital information systems and key e-commerce sites.

The center, which has been in development for the past 15 months, is a key piece of the White House's national cybersecurity strategy and represents a major leap in the federal government's effort to achieve real-time tracking of the Internet's health.

Feds Building Internet Monitoring Center


IEEE Security & Privacy magazine
Topic: Computer Security 12:40 am EST, Dec 17, 2002

] Organizations relying on the Internet face significant
] challenges to ensure that their networks operate safely.
] And that their systems continue to provide critical
] services even in the face of attacks.
]
] Denial of service, worms, DNS, and router attacks are
] increasing. To help you stay one step ahead of these and
] other threats, the IEEE Computer Society is introducing a
] new periodical in 2003 IEEE Security & Privacy magazine.
]
] IEEE Security & Privacy will rethink the role and
] importance of networked infrastructure and help you
] develop lasting security solutions.

In 2003, IEEE is offering a new publication that may be of interest to you.

IEEE Security & Privacy magazine


Survey on Information Infrastructure Security
Topic: Computer Security 11:02 pm EDT, Sep 29, 2002

RAND is helping the Institute for Information Infrastructure Protection to develop a national R&D agenda to protect the nation's existing information infrastructure.

One way that we are doing this is via on-line surveys of different focus groups that either rely heavily on the existing infrastructure or develop products, services or technology for it. Two such groups are the academic researchers community and IT security hardware and software vendors.

The survey should take no more than 30 minutes or so.

Survey on Information Infrastructure Security


Principles of Secure Network Systems Design
Topic: Computer Security 9:57 pm EDT, Sep  9, 2002

This new book establishes a comprehensive framework for network security design, unifying the many concepts and aspects of network security and enabling all users to employ a common security foundation. It is presented from the perspective of fundamental principles underlying networking, network control algorithms and security.

"Principles of Secure Network Systems Design" presents the topic in three basic parts. Part one covers the basic background of network security and the current scope for security in all types of networks and organizations. Part two focuses on the essential nature of network security and a scientific methodology for secure network design. Lastly, part three discusses concrete applications of the design concepts with real world networks.

Principles of Secure Network Systems Design


Choosing Reputable Servents in a P2P network
Topic: Computer Security 9:49 am EDT, Sep  5, 2002

In this paper we propose an approach to P2P security where servents can keep track, and share with others, information about the reputation of their peers. Reputation sharing is based on a distributed polling algorithm by which resource requestors can assess the reliability of perspective providers before initiating the download. The approach nicely complements the existing P2P protocols and has a limited impact on current implementations. Furthermore, it keeps the current level of anonymity of requestors and providers, as well as that of the parties sharing their view on others' reputations.

Choosing Reputable Servents in a P2P network


Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages
Topic: Computer Security 11:54 pm EDT, Aug 14, 2002

Like no other book before it, Global Information Warfare illustrates the relationships and interdependencies of business and national objectives, of companies and countries, and of their dependence on advances in technology.

This book sheds light on the "Achilles heel" that these dependencies on advanced computing and information technologies create. It underscores how hostile countries, business competitors, terrorists, hacktivists and others are waging Information Warfare (IW) against their adversaries.

This may sound like science fiction, but it has been happening for years and continues to this day -- anyone and everyone can be a target and a casualty.

Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages


Cyberwar, Netwar and the Revolution in Military Affairs - Real Threats and Virtual Myths
Topic: Computer Security 8:35 am EDT, Aug  5, 2002

This will be the second time an International School on Disarmament and Research on Conflicts (ISODARCO) summer course will focus on information technologies and their relation to war and international relations.

The course, on "Computers, Networks and Prospects for European and World Security", will be focused on Cyberwar (CW), Netwar (NW), the current Revolution in Military Affairs (RMA) and related issues.

Issues of major importance in such a discussion are: the relation between computers and regional defense; the threat of "cyberterrorism" as well as "cyberwar"; new forms of group organization like "networks" and how information technology supports them; the impact of information technology developments on military doctrine and organization of military forces.

Follow the "Principal Lecturers" link for lots of good references on the topic.

Cyberwar, Netwar and the Revolution in Military Affairs - Real Threats and Virtual Myths


Dynamic system defense for information warfare
Topic: Computer Security 8:14 am EDT, Aug  5, 2002

United States Patent: 6,408,391

Disclosed is a method and apparatus which includes a security computer system capable of deploying and monitoring software agents on one or more nodes of a network of computers.

The agents on each node include a framework agent and either a misdirection mission or a defensive mission.

Upon an intrusion detection mission sending information to the security computer system indicative of an actual or suspected misuse or intrusion, the security computer system can automatically take countermeasures against the suspected or actual intrusion or misuse.

Automatic countermeasures include using a defensive countermeasure to increase an auditing level conducted by the intrusion detection mission.

A misdirection countermeasure mission is used to misdirect requests of the suspected or actual intruder or misuser. An offensive countermeasure is used to send a chase mission to the suspected or actual intruder.

The offensive chase mission can either be automatically dispatched or dispatched with human intervention. The computer system includes a monitor for monitoring by a human system administrator.

Designed by Ms. Julie Huff, a systems architect at PRC (Northrup Grumman), who calls herself an "idea girl."

Dynamic system defense for information warfare


GAO: Critical Infrastructures At Great Risk [PDF]
Topic: Computer Security 9:16 pm EDT, Jul 24, 2002

The explosion in computer interconnectivity, while providing great benefits, also poses enormous risks. Terrorists or hostile foreign states could launch computer-based attacks on critical systems to severely damage or disrupt national defense or other critical operations.

After reviewing the president's plan for homeland security, GAO found that many challenges remain. Among them:

Developing a national critical infrastructure protection strategy.
Improving analytical and warning capabilities.
Improving information sharing.
Addressing pervasive weaknesses in federal information security.

The nation's critical infrastructures are sitting ducks, and people are whining about the stock market.

How secure are your services? How many different ways can you drive to work? What if the US interstate highway system was closed for a month while telecom, television, radio, and electricity services were offline? Would that affect you?

GAO: Critical Infrastructures At Great Risk [PDF]


Forensic Examination of a RIM (BlackBerry) Wireless Device [PDF]
Topic: Computer Security 9:35 pm EDT, Jul  6, 2002

This document is intended to familiarize the investigator with various methodologies and tools available to perform a forensic examination of a RIM (BlackBerry) device. The procedures and tools presented are by no means all encompassing, but are intended to elicit design of custom tools by those more programmatically inclined. The methods contained within have been tested using an Exchange Edition RIM pager model 950 and an Exchange Edition RIM handheld model 957.

Computer Forensics: Hacking for Cops.

Forensic Examination of a RIM (BlackBerry) Wireless Device [PDF]


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0