Computing insecurity
Related Articles
- Fight next security war. Lundquist, Eric // eWeek;5/23/2005, Vol. 22 Issue 21, p26
The article focuses on computer security. According to the author, in the future security will be treated as a service by the internal technology staff or purchased via subscription from an outside provider. The days of piecemeal security upgrades and client to client scrambles are quickly...
- Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24
This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...
- An Usage-Centric Botnet Taxonomy. Czosseck, Christian; Podins, Karlis // Proceedings of the European Conference on Information Warfare & ;2011, p65
Botnets have been a recognized threat to computer security for several years. On the timeline of malware development, they can be seen as the latest evolutionary step. Criminals have taken advantage of this new technol-ogy and cyber crime has grown to become a serious and sophisticated problem...
- FIVE CRITICAL ELEMENTS OF SECURITY REMAIN RELEVANT TODAY. Coffee, Peter // Baseline;Aug2007 Supplement, p23
The article offers information about the five critical elements of security relative to technology. Some of the viruses that have widely infected millions of computers in the U.S. are elaborated including the Nimda worm, Slammer worm and Sober worm. To improve the security of electronic...
- Dirty dozen spam-retaying countries. // Database & Network Journal;Feb2007, Vol. 37 Issue 1, p24
The article reports on the top twelve spam-relaying countries identified by Sophos PLC in its Security Threat Report 2007. The U.S. remains to be at the top of the list of worst spam-relaying countries. The other countries included in the spam-relaying statistics are China including Hong Kong,...
- USB Devices Unveiled. // Database & Network Journal;Aug2006, Vol. 36 Issue 4, p22
The article reports on the condition of universal serial bus (USB) devices, being susceptible to virus. According to the author, reports of the style data theft and comprise are becoming more of threat every day. Once one of the USB devices are plugged in computers, becomes trivial to merely...
- Coalesce Model to Prevent Format String Attacks. Shekhar, Jayant; Yadav, Seema; Ahmad, Khaleel // International Journal of Computer Science Issues (IJCSI);May2011, Vol. 8 Issue 3, p427
Format string attacks cause serious security problems in the field of software security in computer world. Testing and implementation against to Format String vulnerabilities can avoid result due to working of Format String Bugs. In this paper, we have proposed eight novel approaches to prevent...
- Enterprise Security Strategy. Ali Pabrai, Uday O. // Certification Magazine;Nov2003, Vol. 5 Issue 11, p48
Offers tips on implementing an enterprise security strategy. Increase in hacker sophistication and speed of attacks; Ways to counter cyber crimes; Strategic objectives for business security.
- Surviving Hacker Attacks Proves that Every Cloud Has a SILVER LINING. Cheng, Kirby // Computers in Libraries;Mar2005, Vol. 25 Issue 3, p6
This article presents a narrative on how the author dealt with computer hackers. The first hacker attack occurred when I was a new administrator. Late at night, the campus Information Technology (IT) department's network monitoring system detected an unusually high volume of traffic originating...