White House plan for surveillance system draws fire

Messmer, Ellen
August 1999
Network World;08/02/99, Vol. 16 Issue 31, p14
Trade Publication
Reports on criticisms against the United States government's proposal to build a nationwide intrusion-detection system to monitor government and private sector computer networks. Concerns expressed by the Center for Democracy and Technology and the Americans for Computer Privacy regarding the Federal Intrusion Detection Network.


Related Articles

  • Gray Hat.  // Network Dictionary;2007, p220 

    A definition of the term "Gray Hat" is presented. It refers to a hacker/cracker who probes a security weakness in a computer system or product to bring the weakness to the owner's attention. A gray hat does his work without malicious intent unlike a black hat.

  • Authorities boost cyber defences.  // Journal of Turkish Weekly;6/2/2014, p2 

    The article discusses the Turkish government's efforts in strengthening cyber security within the country as of June 2, 2014. Topics include the lack of awareness and well-trained professionals in cyber technology in Turkey, the Turkish military's Cyber Warfare Command which monitors its...

  • Shoring up security against cyberterrorists. Thurman, Skip // Christian Science Monitor;10/10/97, Vol. 89 Issue 222, p3 

    Focuses on efforts to develop security measures to protect computer systems from hackers and computer terrorists. A United States presidential commission studying the vulnerability of United States systems; Safety recommendations, including information sharing on security measures, research and...

  • Security Management: Making Sense of Events. King, Christopher M. // Business Communications Review;Sep2001, Vol. 31 Issue 9, p32 

    Looks at strategies to properly alert, categorize and react to security events. Options of an organization following the occurrence of a security event; Management of a security incident; Components of the security architecture.

  • EC forms a single cyber security agency for Europe. Goodwin, Bill // Computer Weekly;2/13/2003, p4 

    Reports on the formation of the European Network and Information Security Agency by the European Commission. Agency's purpose of fighting the growing threats posed by computer viruses, hacking and denial-of-service attacks; Agency's aim of acting as a central resource for European countries...

  • Botched by bureaucracy. Radcliff, Deborah // Network World;08/02/99, Vol. 16 Issue 31, p1 

    Reports that the United States Defense Department plans to shore up the security of its nonclassified computer networks. Challenges facing the project called the Defensewide Information Assurance Program; Result of similar initiative in the past called Defensewide Information Systems Security...

  • Encryption overseas can be a headache.  // Business Communications Review;Jan1996, Vol. 26 Issue 1, p14 

    Reports on the complaints by American companies regarding network security of the United States State Department rules. Rules applying to software products that use encryption; Allowing vendors to sell products with encryption to US companies with overseas operations; Classification of encryption.

  • QUICK TAKE.  // Credit Union Directors Newsletter;Feb2006, Vol. 30 Issue 2, p1 

    The article reports that according to an annual study by the Computer Security Institute, virus attacks remain the top threat to computer security in the United States. Unauthorized use of computer systems and denial of service attacks are also listed as top threats. Business organizations...

  • Government and industry back IT security professionalism plans. Goodwin, Bill // Computer Weekly;3/15/2005, p5 

    The article discusses proposals to create a professional institution that would set minimum standards of professionalism for information technology (IT) security specialists. The Department of Trade & Industry, the Cabinet Office and some of Great Britain's largest firms have agreed to fund...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics