Taking the Fight to the Net

Keggler, Johnny
April 2008
Armada International;Apr/May2008, Vol. 32 Issue 2, p16
This article discusses the efforts made by government agencies to address cyber attacks. Thales and Eads Defence & Security were awarded a contract to develop, manufacture and install the Intraced, the first secure intranet to connect the French Ministry of Defence and the armed forces. The so-called Black Economy of hackers, data burglars and code-thieves is a multi-billion European business, with the majority of players producing code in East Europe, Russia and Asia.


Related Articles

  • DOES ENTERPRISE SIZE MATTER IN ACHIEVING INFORMATION SECURITY? Kim, Eyong B.; KBzullak, Michael // Review of Business Research;2008, Vol. 8 Issue 6, p41 

    Enterprises provide many different security measures to keep their information safe such as firewalls, anti-virus software, or biometrics. It is possible that larger enterprises could offer more sophisticated security measures and information security trainings to end users. In that regard, this...

  • Cost-effective IT strategies to drive growth momentum.  // Siliconindia;Feb2010, Vol. 13 Issue 2, p21 

    The article focuses on the increasing interest on cloud computing and emphasis on cyber security. It states that cloud computing will be dominant in the internet and intranet and the introduction of new measures to lessen savvy hackers by security experts in the U.S. like Cyber Czar will thrive...

  • Authentication gets smart. Blum, Daniel // Network World;12/2/2002, Vol. 19 Issue 48, p51 

    Comments on developments related to intranet security. Efforts of company to enhance the authentication features of their intranets; Conflicts between security and convenience; Promise and limitations of biometrics; Smart cards.

  • Around The World On $400M. Cone, Edward // Inter@ctive Week;08/23/99, Vol. 6 Issue 34, p25 

    Presents information on the plan of KPMG International to develop KWorld, a global intranet project. Budget for the project; Mission of KWorld on KPMG; Countries where KWorld has already been deployed; Benefits offered by KWorld. INSET: What's in a name?.

  • Online Intrusion Alert Aggregation with Generative Data Stream Modeling. Hanock, M.; Srinivas, K.; Yaganteeswarudu, A. // International Journal of Computer Science & Network Security;Sep2013, Vol. 13 Issue 9, p98 

    Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts--produced by low-level intrusion detection systems, firewalls, etc.--belonging to a specific attack instance which has been initiated by an attacker at a certain point in...

  • EXTENDED HONEYPOT FRAMEWORK TO DETECT OLD/NEW CYBER ATTACKS. SAINI, HEMRAJ; MISHRA, BIMAL KUMAR; PRATIHARI, H. N.; PANDA, T. C. // International Journal of Engineering Science & Technology;2011, Vol. 3 Issue 3, p2421 

    In cyber space, a hot problem is to detect the newly emerged malicious objects. There are significant methodologies to detect the early detected malicious objects but not for newly emerged malicious objects. Generally, the widely applicable approach to detect the early detected malicious objects...

  • Coming to grips with intranet security. Kobielus, James // Network World;08/18/97, Vol. 14 Issue 33, Intranet p12 

    Focuses on network managers' efforts to enhance the security of intranets. Efforts to address the vulnerabilities of browsers; Secure Sockets Layer cryptography protocols; Security concerns about Java and ActiveX; Server security; Gateway security.

  • Navy moves ahead with ambitious communications network. Wilson, J.R. // Military & Aerospace Electronics;May2000, Vol. 11 Issue 5, p1 

    Reports on the United States Navy's plan to award a contract worth an estimated ten billion dollars in June 2000 to build a Navy/Marine Corps Intranet (NMCI) despite harsh criticism from the United States General Accounting Office. Teams competing for the contract; Services to be provided by...

  • Worldtalk, Cylink ready new security products. Messmer, Ellen // Network World;07/12/99, Vol. 16 Issue 28, p8 

    Highlights the plan of WorldTalk to ship software that lets network managers exert control over Web usage and block the transmission of sensitive documents from a corporate intranet. Examination of any HTTP or File Transfer Protocol transmission; Performance of routine checks for computer...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics