TITLE

Untitled

AUTHOR(S)
Savvas, Antony
PUB. DATE
November 2007
SOURCE
Computer Weekly;11/20/2007, p112
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents information on the survey of over 200 government Information Technology (IT) officials across 30 civilian and military institutions in the U.S. by Cisco Systems Inc. The survey showed the U.S. federal IT decision-makers' lack of confidence in existing network security systems, despite high spending on government mandated, schemes. It states that Widespread spyware and Web 2.0 concerns, fuelled the lack of confidence. It said the arrival of IPv6 networks, to help improve security and performance of networks, was winning support among government officials, but that the take-up of IPv6 was still very low.
ACCESSION #
27962763

 

Related Articles

  • Ask Dr. Internet. Blass, Steve // Network World;8/15/2005, Vol. 22 Issue 32, p29 

    This article presents a question and answer advisory about the existence of the GiantAntiSpywareUpdater in the task list of a Windows portable computer. It sounds like the Microsoft AntiSpyware program is installed on the operating system. Microsoft Corp. bought and re-branded the...

  • Norton Internet Security 2005 AntiSpyware Edition.  // APC (Bauer Media Group);Oct2005, Vol. 25 Issue 10, p50 

    Reviews the computer security software Norton Internet Security 2005 AntiSpyware Edition.

  • Dominican U. Secures Network to Protect Students and Faculty. Ratcliffe, Jackson // T H E Journal;Apr2005, Vol. 32 Issue 9, p51 

    Focuses on the approaches used by Dominican University of California in dealing with computer viruses and spyware. Impact of spyware and viruses on the computer system; Process for dealing with malicious codes and computer network protection developed by the university; Role of the government...

  • Fighting the new breed of security threat. King, Paul // Computer Weekly;11/15/2005, p64 

    The article focuses on information security. High-capacity digital storage devices, such as the USB thumbdrives, home broadband connections with virtual private network and the threat of malware are all mechanisms by which thieves can get their hands on data. Spyware can make its way into a...

  • McAfee, Tech Assist top anti-spyware test. Nance, Barry // Network World;9/12/2005, Vol. 22 Issue 36, p52 

    This article presents the results of the Clear Choice Test for anti-spyware tools by the journal "Network World." Spyware can kill the business quicker than spam or viruses. Spam eats bandwidth and productivity. Viruses delete files, throw egotistical messages on the screen, and use the address...

  • A booster shot for anti-virus. Garcia, Andrew // eWeek;5/28/2007, Vol. 24 Issue 19, p35 

    The article focuses on the complacent attitude of several computer companies concerning their anti-virus offerings in the U.S. It highlights several information technology (IT) firms which have no significant improvement on its existing anti-malware technologies. As an example, the author cites...

  • Big guns declare battle on spyware. Dix, John // Network World;2/6/2006, Vol. 23 Issue 5, p28 

    The article praises the collaborative effort of top computer security vendors such as McAfee, Symantec, Trend Micro, ISCA Labs and Thompson Cyber Security Lab, with regards to their proposed standards for testing anti-spyware software and equipment. The suggested standards are sensible and were...

  • Shavlik adds anti-spyware. Fontana, John // Network World;9/19/2005, Vol. 22 Issue 37, p72 

    This article reports that Shavlik Technologies LLC, long known for patch management software, is adding anti-spyware capabilities to its platform. The company released Shavlik NetClik Spyware, a stand-alone application that lets customers detect and remove spyware from any server or workstation...

  • Signature.  // Network Dictionary;2007, p441 

    An encyclopedia entry for "Signature" in information security is presented. It is a distinct pattern in network traffic that can be identified with a specific tool or exploit. Security technologies like Intrusion Detection System, anti-virus and anti-spyware match traffic contents with signature...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics