Wipe out Web graffiti by going back to basics

Schwartau, Winn
February 2000
Network World;02/14/2000, Vol. 17 Issue 7, p59
Trade Publication
Discusses the essentials of computer security. Importance of confidentiality; Availability of mission-critical applications; Ensuring the integrity of data; Achievement of confidentiality through encryption of transmission; Methods for ensuring the integrity of data.


Related Articles

  • Cracking `secure' data is all too easy, even for inexperienced hackers. Petreley, Nicholas // InfoWorld;1/22/96, Vol. 18 Issue 4, p96 

    Comments on the ease with which one can crack the encryption of commercial software. Anemic quality of encryption schemes used by commercial software; Vulnerability of the exclusive OR (XOR) encryption algorithms; Pervasiveness of security weakness; Susceptibility of encryption algorithms to...

  • BATTLE FOR CONTROL OF ENCRYPTION TECHNOLOGY. Banisar, David; Trubow, George W. // IEEE Software;Jul93, Vol. 10 Issue 4, p95 

    Discusses the growing conflict for encryption technology control in the United States. Opposition to encryption control; Efforts to stop the widespread use of encryption; Involvement of government agencies in the encryption control battle.

  • Is your data safe? Schafer, Sarah // Inc.;1997 Inc. Technology 2, Vol. 19 Issue 9, p93 

    Offers advice for choosing security for a company's computer system. The wide range of options; The importance of assessing one's requirements before shopping; The two most basic types of protection including firewalls and encryption.

  • Securing information on the Internet.  // Supervisory Management;Sep95, Vol. 40 Issue 9, p3 

    Focuses on cryptographic technology for effective encryption of information on the Internet. Digital signing of a communication or the use of secret keys; Symmetric key cryptography or a secret number or key for two communicating parties; Public keys that serve as the user's identification...

  • OVERLOOKED BEST PRACTICES. Udell, Jon // InfoWorld;8/26/2002, Vol. 24 Issue 34, p44 

    Presents information on the often-overlooked strategies for computer security. Application of encrypted password database; Digital identification to authenticate and encrypt; Encryption of mailbox access.

  • Secure your data. Peers, Nick // APC (Bauer Media Group);Mar2010, Vol. 30 Issue 3, p98 

    The article offers step-by-step instructions for encrypting data with the help of BitLocker encryption system, built into the Enterprise and Ultimate versions of operating system Windows Vista and 7.

  • T-shirt terrorism. Stanglin, Douglas; Dentzer, Susan // U.S. News & World Report;10/16/95, Vol. 119 Issue 15, p28 

    Discusses how intelligence and federal law enforcement officials have long opposed the export or publication of computer programs that could be used to encrypt electronic communications. Arguments of private security experts and computer buffs that such restrictions are a threat to privacy;...

  • Keys to the kingdom. Dibbell, Julian // Time International (South Pacific Edition);11/11/96, Issue 46, pTD28 

    Focuses on the importance of encryption in an online world. Worries of governments around the world about wiretapping and other surveillance ; Civil libertarians who fear the that government antiencryption measures could cripple our last best hope for real privacy; Work of mathematicians...

  • Public-key encryption for dummies. Rothman, Mike // Network World;05/17/99, Vol. 16 Issue 20, p35 

    Focuses on public-key infrastructure-based encryption. Delivery of a way to prove identity in the online world; Cornerstone of information security technology for a large number of companies; Need for a certificate authority to verify online identity.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics