TITLE

The absence of network security

AUTHOR(S)
Bradner, Scott
PUB. DATE
August 1999
SOURCE
Network World;08/02/99, Vol. 16 Issue 31, p27
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Asserts that there is no such thing as a secure computer network. Internet Engineering Task Force's views on the issue; Problems users can create with network security; Need for companies to get security expertise on their software development.
ACCESSION #
2658441

 

Related Articles

  • Security plan backed by IETF. Heichler, Elizabeth // InfoWorld;11/30/98, Vol. 20 Issue 48, p46 

    Focuses on a milestone reached by the OpenPGP security protocol. Status of proposed standard by the Internet Engineering Task Force; Open standards version of Network Associates' PGP encryption protocol.

  • IPv6 Goes Embedded. Titus, Jon // ECN: Electronic Component News;Jan2010, Vol. 54 Issue 1, p11 

    The article reports on the development of the Internet Engineering Task Force (IETF) of the sixth version of Internet protocol (IPv6) due to the inadequacy of its fourth version (IPv4). It states that the improved protocol uses a 128-bit address that can cover about 3.4x1038 unique address. It...

  • Protecting the `private' in VPN. MacLeod, Alan // Network World;09/27/99, Vol. 16 Issue 39, p33 

    Focuses on Internet Engineering Task Force efforts to simplify and standardize key dial-up virtual private network (VPN) services. Features of the Internet Key Exchange (IKE) Configuration Methods proposed by the Task Force's Internet Protocol Security (IPSec) working group; Digital...

  • Is domain name system vulnerable to slamming? Marsan, Carolyn Duffy // Network World;01/17/2000, Vol. 17 Issue 3, p1 

    Discusses the vulnerability of the domain name system from attacks called `slamming.' Unauthorized transfer of customers from one site to another; Criticisms on the design of the Registry Registrar Protocol by the Internet Engineering Task Force. INSET: Domain name knowledge..

  • The Security Ties That Bind. Kerstetter, Jim // PC Week;11/02/98, Vol. 15 Issue 44, p25 

    Reports on efforts to deploy the Internet Protocol (IP) Security (IPSec) specification for virtual private network (VPN) security. Testing of IPSec by the International Computer Security Association; The work of the Internet Engineering Task Force in making IPSec a standard; Distribution...

  • IETF nixes wiretapping, eyes wireless. Marsan, Carolyn Duffy // Network World;03/27/2000, Vol. 17 Issue 13, p10 

    Reports on the decision of the Internet Engineering Task Force to reject proposals for a protocol that would enable law enforcement agencies to intercept communications on the Internet. Policy against building wiretapping capability into the protocols; Plans of the group to focus on the...

  • IEEE Announces Successful Wireless Privacy Trials at IETF and IEEE 802® Meetings.  // Telecom Standards;Jun2015, Vol. 25 Issue 6, p1 

    The article reports on the success of privacy trials undertaken for the Wi-Fi network, also known as the Institute of Electrical and Electronics Engineers (IEEE) 802.11. As suggested, the trials focused on loopholes in privacy while tracking the unique media access control (MAC) addresses in a...

  • Class struggle on the 'Net? Bradner, Scott // Network World;05/11/98, Vol. 15 Issue 19, p40 

    Focuses on the reaction to the Internet Engineering Task Force efforts to define technology to bring quality-of-service (QoS) capabilities on the Internet. Identification of complaints made; Reference to a story carried on CNN news service titled `Tiered service might lock Internet into class...

  • IETF pitches stake for Net EDI standards. Kerstetter, Jim // PC Week;7/29/96, Vol. 13 Issue 30, p1 

    Reports that the Internet Engineering Task Force's EDI Over Internet Workgroup is hammering out requirements for conducting electronic digital interface over the Internet. Attempts to meld traditional electronic forms with emerging Internet-based technologies; Release of a report detailing...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics