TITLE

Nonpassive Defense of the Army's Computer Networks

AUTHOR(S)
King, Thomas G.
PUB. DATE
July 2003
SOURCE
Military Intelligence Professional Bulletin;Jul-Sep2003, Vol. 29 Issue 3, p38
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Talks about the nonpassive defense of the computer networks of the U.S. Army. Details on computer security; Ability of the military to detect intruders in their computer system; Importance of network protection; Use of the Internet in conducting the business of the military.
ACCESSION #
10444986

 

Related Articles

  • Constant Connectivity: Just Because You Can Doesn't Mean You Should. Harrison, Warren // IEEE Software;Mar/Apr2005, Vol. 22 Issue 2, p5 

    The article discusses about the Internet connectivity. The author says he agrees with many readers that one should be able to have convenience and security. The fact that, however, people often don't have the former and almost never have the latter with the majority of Web-based systems they...

  • Internet Scanner 7.0 RealSecure Server 7.0 and Desktop 7.0.  // Database & Network Journal;Aug2003, Vol. 33 Issue 4, p14 

    Reports that Internet Security Systems Inc. has made improvements to its Dynamic Threat Protection platform that enables defense for networks, servers and desktops against known and unknown threats before they can damage data or interrupt business operations. Improvement in vulnerability...

  • A System Dynamics Model of Information Security Investments. Behara, Ravi S.; Huang, C. Derrick; Qing Hu // Journal of Information System Security;2010, Vol. 6 Issue 2, p30 

    Information security management has become an increasingly serious and high-stake challenge to organizations, due to growing reliance on the Internet as the business platform, the intrinsic vulnerability of Internet technologies, and the increasing value of information stored in information...

  • SECURITY.  // Telecom Asia;Jun2005, Vol. 16 Issue 6, p68 

    Reports on the challenges confronting network security. Potential of a hacker to bring down the entire Internet with 100 lines of code; Impact of the current practice of putting security at the edge of the network on network security; Impossibility of scaling by putting all the security at the...

  • CERT's advice does little to hurt IE. Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);Aug2004, p14 

    In May 2004, the Computer Emergency Response Team took the unusual step of suggesting that users switch from Internet Explorer to some other browser because of serious unpatched security flaws. The news caused a surge in downloads of Mozilla, an alternative, open-source browser, which more than...

  • Reducing False Positives in an Anomaly-Based NIDS. Hatamikhah, Saeide; Laali, Mohammad // Proceedings of the International Conference on Information Warfa;2012, p358 

    Internet and computer networks are facing an increasing number of security threats. With new types of attacks that appear continuously, the development of flexible and adaptive security is a serious challenge. In this field, approaches of network-based intrusion detection are ideal techniques to...

  • How to Save the Internet.  // Wilson Quarterly;Summer2006, Vol. 30 Issue 3, p83 

    The article comments on the article The Generative Internet, by Jonathan L. Zittrain, published in the May 2006 issue of Harvard Law Review. It is not corporate ogres or bloodsucking regulators that pose the chief danger, according to the author. Today's rapidly proliferating threats to Internet...

  • Honeynet.  // Network Dictionary;2007, p230 

    A definition for the term "honeynet" is presented. A honeynet refers to a network set up with international vulnerabilities to invite attack, so that an attacker's activities and methods can be studied and that information be used to increase network security. It contains one or more honey pots,...

  • IP Security.  // Network Dictionary;2007, p260 

    A definition of the term "IP Security" is presented. The term refers to a group of protocols that provides security services at the network layer by enabling a system to select required security protocols, determine the algorithms to use for the services and put in place any cryptographic keys...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics