TITLE

The walls don't have ears

PUB. DATE
August 2004
SOURCE
Engineer (00137758);8/6/2004, Vol. 293 Issue 7657, p6
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Reports on BAE Systems' development of a "stealthy wallpaper" to stop outsiders eavesdropping on company Wi-Fi computer networks. Description of the screening material.
ACCESSION #
14078510

 

Related Articles

  • Safeguarding Information. Mark, Jason // BusinessWest;3/21/2005, Vol. 21 Issue 12, p31 

    The article focuses on developing a corporate Electronic-Security Policy. Every business, regardless of size or industry should have an easily understood, consistently enforceable policy to protect trade secrets, maintain the integrity and security of all networks and servers, protect sensitive...

  • Look after your network. Ecott, Tim // Computer Weekly;9/2/2003, p25 

    The article discusses issue of computer network security for the high technology industry. The experience in the industry has shown that businesses are becoming complacent and failing to test the resolve of their security measures. The importance of measures such as virtual private networks,...

  • A Web of Attacks. Allen, Mike // San Diego Business Journal;9/6/2004, Vol. 25 Issue 36, p15 

    Companies are increasing their security measures to prevent viruses on computer networks. Consultants and salespeople working in the area of Internet security no longer face incredulous stares when talking about combating threats to computer networks. The evidence of computer systems under siege...

  • IT execs feeling more heat as security woes multiply. Bednarz, Ann; Dubie, Denise // Network World;8/28/2006, Vol. 23 Issue 33, p1 

    The article focuses on the demand of several companies for greater information technology (IT) accountability due to computer security threats in the U.S. Ohio University has dismissed two senior IT people following news of five security vulnerabilities that exposed the sensitive records of...

  • Cybercrime: THE STORY BEHIND THE STATS. Garretson, Cara; Duffy, Jim // Network World;11/29/2004, Vol. 21 Issue 48, p42 

    This article focuses on the results of a survey sponsored by the "Network World," the Computer Security Institute, and the U.S. Federal Bureau of Investigation's Computer Intrusion Squad, on the status of cybercrime in the country. The outlook on cybercrime is good. There is a decrease in...

  • Profiling cyber criminals: A PROMISING BUT IMMATURE SCIENCE. Bednarz, Ann // Network World;11/29/2004, Vol. 21 Issue 48, p46 

    This article attempts to profile cybercriminals. The original hacker stereotype is a smart and lonely deviant, a teenage or adult male who is full of computer smarts but lacking in social skills. Some computer criminals are technology mavericks who take pleasure in writing and releasing...

  • THE BATTLE AGAINST cyberterror. Blau, John // Network World;11/29/2004, Vol. 21 Issue 48, p49 

    This article examines the condition of cyberterrorism in the U.S. The arsenal of modern weapons that terrorists might someday use to disrupt power grids, gas lines and other parts of the nation's critical infrastructure includes conventional weapons as well as bits and bytes. Although the...

  • IS THE LAW'S ARM long enough? Cox, John; Marsan, Carolyn Duffy // Network World;11/29/2004, Vol. 21 Issue 48, p50 

    This article examines the condition of the legal framework for fighting cybercrime in the U.S. The legal framework for battling cybercrime rests on surprisingly few federal laws. While enforcement officials and other experts seem largely satisfied with these statutes, these laws are designed to...

  • Victim's rights: CYBERCRIME RETALIATION. Dubie, Denise // Network World;11/29/2004, Vol. 21 Issue 48, p54 

    This article suggests ways on how cybercrime victims in the U.S. should respond to such circumstances. Depending on the situations, these victims are advised to: 1) contact law enforcement agencies; 2) reach out to industry organizations; 3) inform other potential victims; 4) refrain from...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics