Create an Account
username: password:
 
  MemeStreams Logo

What questions are you asking yourself?

search

Jeremy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Jeremy's topics
Arts
  Literature
   Classical
   Fiction
   Horror
   Non-Fiction
   Sci-Fi/Fantasy Literature
  Movies
   Movie Genres
    Action/Adventure
    Cult Films
    Documentary
    Drama
    Horror
    Independent Films
    Film Noir
    Sci-Fi/Fantasy Films
    War
  Music
   Music Styles
    Classical
    Electronic Music
    Rap & Hip Hop
    IDM
    Jazz
    World Music
  TV
   TV Documentary
   TV Drama
   SciFi TV
Business
  Finance & Accounting
  Industries
   Tech Industry
   Telecom Industry
  Management
  Markets & Investing
Games
  Video Games
   PC Video Games
   Console Video Games
Health and Wellness
  Medicine
Home and Garden
  Cooking
  Entertaining
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   California
    SF Bay Area
   Events in Washington D.C.
   News for Washington D.C.
   Georgia
    Atlanta
     Atlanta Events
Science
  Biology
  History
  Math
  Medicine
  Nano Tech
  Physics
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Technology
  Biotechnology
  Computers
   (Computer Security)
    Cryptography
   PC Hardware
   Human Computer Interaction
   Computer Networking
   Macintosh
   Software Development
    Open Source Development
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

Biometrics: Hold On, Chicken Little
Topic: Computer Security 10:11 am EST, Jan 26, 2002

Lucas Mast responds to Dorothy Denning's "Why I Love Biometrics" article.

On Thursday, January 24, Joseph Atick of Visionics, Mark Rotenberg of EPIC, Dorothy Denning of Georgetown, and John Woodward Jr. of RAND met at The Cato Institute in DC for a policy forum on the topic of biometrics. Three documents, including this one and "Nameless in Cyberspace" (which discusses Georgia's HB1630), were distributed to attendees.

Biometrics: Hold On, Chicken Little


'Why I Love Biometrics' | Dorothy Denning in InfoSec Magazine
Topic: Computer Security 1:36 pm EST, Jan 20, 2002

Author and professor Dorothy E. Denning explains why good biometrics systems will succeed without keeping secrets. Both direct and concise, it's worth reading. She mentions two startup companies whose biometrics technologies look promising.

'Why I Love Biometrics' | Dorothy Denning in InfoSec Magazine


Workshop on Economics and Information Security
Topic: Computer Security 7:23 pm EST, Jan 15, 2002

Very cool and Important topic for a workshop. SF crew, check it! Members of the program committee include Hal Varian, Ross Anderson, Li Gong, Andrew Odlyzko, and Bruce Schneier. Get to work on your position paper ... time's a-wasting!

"Do we spend enough on keeping `hackers' out of our computer systems? Do we not spend enough? Or do we spend too much?

Many system security failures occur not so much for technical reasons but because of failures of organisation and motivation. For example, the person or company best placed to protect a system may be insufficiently motivated to do so, because the costs of system failure fall on others. Such perverse incentives raise many issues best discussed using economic concepts such as externalities, asymmetric information, adverse selection and moral hazard. They are becoming increasingly important now that information security mechanisms are not merely used to protect against malicious attacks, but also to protect monopolies, differentiate products and segment markets. There are also interesting security issues raised by industry monopolization and the accompanying reduction in product heterogenity. For these and other reasons, the confluence between information security and economics is of growing importance.

We are organising the first workshop on the topic, to be held in the School of Information Management and Systems at the University of California, Berkeley, on the 16th and 17th May 2002. In order to keep the event informal and interactive, attendance will be limited to about 30-35 participants. If you would like to participate, please send us a position paper (of 1-2 pages) by the 31st March 2002.

We welcome interest not just from economists and information security professionals, but from people with relevant experience, such as in the insurance industry, corporate risk management, or law enforcement agencies.

Workshop on Economics and Information Security


Secure Communications Operational Tradecraft [PDF]
Topic: Computer Security 1:47 pm EST, Jan 12, 2002

"How Not To Be Seen"

Published on 11 January 2002, this 16-page document from Decision Support Systems, Inc. explains the purpose of "SCOT", discusses best practices, highligts weaknesses in and attacks on SCOT, and more. There are lots of other papers listed on the company's web site (metatempo.com), including "Applications of Memetics" and "Memetic Engineering-PsyOps and Viruses for the Wetware". The "Wetware" paper was published in 1993 and is also hosted online by 7Pillars Partners. (DSSi and 7Pillars are partner firms.)

The firm is self-described in this way: "DSSi is a collective of high-tempo, multi-disciplinary, self-organizing, and experienced professionals with a wide range of cross-domain expertise, from international economics, finance, and operations, to technology development, security, intelligence, and cognitive sciences. We combine such domain expertise with a deep understanding of the rapidly evolving international environment to help clients improve the value of their operations, reframe their strategic position or brand, improve their business processes continually, and implement custom solutions in order to thrive on the increasing complexity of modern global political economies."

Secure Communications Operational Tradecraft [PDF]


Cybersecurity Today and Tomorrow: Pay Now or Pay Later
Topic: Computer Security 8:56 pm EST, Jan 10, 2002

The National Academy of Sciences has made available a prepublication copy of this report on "cybersecurity." David Clark, Butler Lampson, Don Norman, David Patterson, Herb Lin, and others on the Computer Science and Telecommunications Board produced this report. Reviewers include Steve Bellovin, Carl Landwehr, and Fred Schneider.

Excerpts of the summary from 01/09/02 NYT: [O]ur ability and willingness to deal with threats has, on balance, changed for the worse. ... Industry needs to do more, and policy makers should finance research.

Don't you have infrastructure to secure? Read this report, and then GET BUSY!

Cybersecurity Today and Tomorrow: Pay Now or Pay Later


Building Secure Software: How to Avoid Security Problems the Right Way
Topic: Computer Security 2:35 pm EST, Jan  5, 2002

"Building Secure Software cuts to the heart of computer security to help you get security right the first time. If you are serious about computer security, you need to read this book, which includes essential lessons for both security professionals who have come to realize that software is the problem, and software developers who intend to make their code behave. Written for anyone involved in software development and use--from managers to coders--this book is your first step toward building more secure software. Building Secure Software provides expert perspectives and techniques to help you ensure the security of essential software. If you consider threats and vulnerabilities early in the devel-opment cycle you can build security into your system. With this book you will learn how to determine an acceptable level of risk, develop security tests, and plug security holes before software is even shipped."

One of the chapters of this book is entitled "trust management and input." Although the site appears to offer a sample chapter, it is not currently available at the specified URL.

Building Secure Software: How to Avoid Security Problems the Right Way


On the Security and Vulnerability of PING
Topic: Computer Security 7:55 pm EST, Nov 26, 2001

"We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is secure against weak adversaries (and insecure against strong ones). We then argue that despite the security of PING against weak adversaries, the natural vulnerability of this protocol (or of any other protocol for that matter) can be exploited by a weak adversary to launch a denial of service attack against any computer that hosts the protocol. Finally, we discuss three mechanisms, namely ingress filtering, hop integrity, and soft firewalls that can be used to prevent denial of service attacks in the Internet."

On the Security and Vulnerability of PING


Infineon, Sony To Jointly Develop Contactless Chip Card ICs
Topic: Computer Security 11:49 pm EST, Nov 14, 2001

Infineon Technologies AG and Sony Corp. today announced a joint development covering secure ICs for contactless chip card systems. This technology would be used for secure authentication and identification functions in applications like banking cards, government or company issued ID cards and public transit electronic fare tickets.

The companies will combine Sony's FeliCa contactless chip card technology with Infineon's experience in secure chip card ICs and semiconductor manufacturing processes.

A contactless chip card has a special transmission module for over-the-air data communication, consisting of a chip and an antenna embedded in the card, so that the card does not have to be inserted into a terminal's slot.

[Sony has shipped] about 11 million equipped with on-card memory [...] used for Hong Kong?s public transport systems.

MemeStreamers: Have you seen/used these cards when in HK? I'm also curious to know if the Cambridge [UK] crew has experimented with these devices.

Infineon, Sony To Jointly Develop Contactless Chip Card ICs


Computer Security: Improvements Needed to Reduce Risk to Critical Federal Operations and Assets [PDF]
Topic: Computer Security 6:03 pm EST, Nov 10, 2001

A 26-page report, issued November 9.

Testimony Before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives

* continuing pervasive weaknesses in federal information security
* serious risks that these weaknesses pose at selected individual agencies
* major common weaknesses that agencies need to address
* the importance of establishing a strong agencywide security management program in each agency

Excerpts: at least 20 countries are targeting infowar against the United States; significant weaknesses were found at every federal agency studied; IRS electronic filing systems are vulnerable; agencies lack necessary expertise and the funds needed to acquire and retain it.

Computer Security: Improvements Needed to Reduce Risk to Critical Federal Operations and Assets [PDF]


LNCS2137: Information Hiding Workshop 2001
Topic: Computer Security 9:08 pm EDT, Oct 25, 2001

Finally! This conference was held back in April, but the proceedings just became available online today. Get 'em while they're hot! (if you can :( )

Authors whose names many may know or recognize include Tonda Benes, Markus G. Kuhn, Adam Back, Ulf Möller, David Goldberg, Roger Dingledine, Michael J. Freedman, and David Molnar.

This conference is typically full of excellent papers, but those of particular interest may include:

The Strong Eternity Service
A Reputation System to Increase MIX-Net Reliability
An Analysis of One of the SDMI Candidates
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
Real World Patterns of Failure in Anonymity Systems
Intellectual Property Metering
Computational Forensic Techniques for Intellectual Property Protection
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding

LNCS2137: Information Hiding Workshop 2001


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0