TITLE

Computer security in academia-a potential roadblock to distributed annotation of the human genome

AUTHOR(S)
Greenbaum, Dov; Douglas, Shawn M; Smith, Andrew; Lim, Joanna; Fischer, Michael; Schultz, Martin; Gerstein, Mark
PUB. DATE
June 2004
SOURCE
Nature Biotechnology;Jun2004, Vol. 22 Issue 6, p771
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
With the Blaster and SoBig virus outbreaks of the past summer and the daily nuisance of spam, computer security is, unfortunately, grabbing headlines. They directly increase the costs of using interoperating computers, diverting scarce resources from other activities. Modern science is completely dependent on computers to analyze and archive data. Moreover, certain subfields, such as genomics, increasingly use interoperating computers extensively for communication and dissemination. Unfortunately, computer security considerations make realizing this vision increasingly difficult.
ACCESSION #
13296864

 

Related Articles

  • Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24 

    This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...

  • An Usage-Centric Botnet Taxonomy. Czosseck, Christian; Podins, Karlis // Proceedings of the European Conference on Information Warfare & ;2011, p65 

    Botnets have been a recognized threat to computer security for several years. On the timeline of malware development, they can be seen as the latest evolutionary step. Criminals have taken advantage of this new technol-ogy and cyber crime has grown to become a serious and sophisticated problem...

  • ID Theft: Keep Your Information to Yourself. Perry, Phillip // Rural Telecommunications;Mar/Apr2004, Vol. 23 Issue 2, p62 

    Presents tips to protect information on computers from identity theft. Ways to block the attack of computer hackers; Advice to reduce overall computer security risks; Information on computer virus and trojan horse software.

  • Order of the day Integrated Security. Jain, Sanjeev // Siliconindia;Feb2005, Vol. 9 Issue 1, p34 

    The article discusses antivirus company McAfee Security's integrated solution for computer security. It delivers comprehensive protection from malicious threats under one management console, providing customers with a greater degree of control for detecting known and unknown threats....

  • The rise of cyber-crime families. Prince, Brian // eWeek;7/21/2008, Vol. 25 Issue 22, p16 

    The article offers information on the Cyber-crime organizations in the U.S. These group collaborate around a classic Mafia-style model. Research shows that the organization's computer threats have grown more sophisticated wherein individual hackers are replaced with a well-structured...

  • A Compelling Argument For Automated Code Testing. Schmidt, Howard A. // Software World;Jul2008, Vol. 39 Issue 4, p14 

    The article discusses the importance of automated code testing to software companies in Great Britain. Due to the rising cases of internet fraud, malware, computer hacking and computer viruses, companies are looking for ways to address and mitigate the detrimental effects of such events. It...

  • Fight next security war. Lundquist, Eric // eWeek;5/23/2005, Vol. 22 Issue 21, p26 

    The article focuses on computer security. According to the author, in the future security will be treated as a service by the internal technology staff or purchased via subscription from an outside provider. The days of piecemeal security upgrades and client to client scrambles are quickly...

  • Computing insecurity. Gonsalves, Chris // eWeek;5/23/2005, Vol. 22 Issue 21, p32 

    The article focuses on computer security. A computer virus Trojan sits quietly on an infected machine until a user authenticates to an online banking site with a token. The authentication prompts the Trojan to action, where it opens a background session with the user's online banking site,...

  • New research predicts digital Armageddon.  // MarketWatch: Technology;February 2005, Vol. 4 Issue 2, p23 

    Reports on a survey aimed to collect predictions on how the Internet will affect society in the next decade in the U.S. Indications showing a wide agreement among expert respondents that at least one devastating attack will occur on the networked information infrastructure; Contentions over the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics