TITLE

SECURE DEVICES FOR EVERYONE

AUTHOR(S)
Gomes, Lee
PUB. DATE
March 2009
SOURCE
Forbes Asia;3/2/2009, Vol. 5 Issue 3, p72
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on the development of secure digital devices. The U.S. National Institute of Standards & Technology (NIST) has created a list of quality standards for data encryption and scrambling for mobile devices. The NIST specifications spell out the sorts of encryption systems that can be used to scramble messages.
ACCESSION #
37021771

 

Related Articles

  • NIST Seeks Info on Computer and Information Security Services.  // TR2: Terror Response Technology Report;1/4/2012, Vol. 8 Issue 1, p26 

    The article reports that the U.S. National Institute of Standards and Technology (NIST) Information Technology Laboratory, Computer Security Division, is seeking information on cyber and information security services.

  • NIST Aims to Enhance Cybersecurity. D'Amico, Esther // Chemical Week;10/27/2004, Vol. 166 Issue 35, p29 

    Focuses on the actions taken by the U.S. National Institute of Standards & Technology (NIST) to improve cybersecurity for networked process control and supervisory control and data acquisition systems. Goal of the System Protection Profile for Industrial Control Systems draft guidelines...

  • Ghosts in the Machine: Attacks May Come From Inside Computer's. Kite, Shane // Securities Industry News;8/17/2009, Vol. 21 Issue 18, p1 

    The article reports on the warning by security experts that the most sophisticated Trojan Horses appearing on Wall Street financial systems may be threaded into the silicon of integrated circuits by design. It notes the difficulty of detecting such malware after a chip is fabricated. To combat...

  • Data Storage and Disaster Recovery. Colby, Kent L. // Alaska Business Monthly;Aug2006, Vol. 22 Issue 8, p70 

    The article discusses data storage, disaster recovery, and data management in business. The Sarbanes-Oxley Act (SOX) for the private sector and the National Institute of Standards and Technology (NIST) for government agencies address data storage, stability, security, and recovery. It also cites...

  • 10 Commandments of Secure Engineering. Taft, Darryl K. // eWeek;8/11/2014, p1 

    The article discusses issues concerning security systems engineering. Topics covered include the draft guidelines released by the U.S. National Institute of Standards and Technology (NIST) and the 10 tenets of secure engineering which include separation of data, accessibility of telemetry and...

  • A Matter of Policy. Ferraiolo, David; Voas, Jeffrey; Hurlburt, George F. // IT Professional;Mar/Apr2012, Vol. 14 Issue 2, p4 

    To many, system policy is a statement posted on a website indicating intention to protect personal data. In reality, policy is much broader, and its enforcement far more consequential. What if policy-derived rule sets could be rigorously defined and automated for software-intensive systems?...

  • Twelve Steps To IT Security Nirvana. MocLeod, Colum // Database & Network Journal;Dec2011, Vol. 41 Issue 6, p22 

    The article offers recommendations on how to achieve information security. It emphasizes the recommendation from the U.S. National Institute of Standards and Technology (NIST) which stresses the significance of replacing the 1024-bit encryption keys. It highlights the importance of establishing...

  • Understanding the New Frederal Cyber Laws. Dahl, Matthew // Security: Solutions for Enterprise Security Leaders;Mar2015, p34 

    The article focuses on the passage of legislative bills related to cybersecurity topics which include the Cybersecurity Enhancement Act of 2014 and the Cybersecurity Workforce Assessment Act. The good reason of companies to consider the U.S. National Institute of Standards and Technology (NIST)...

  • Don't Be Out'smart'ed. Panettieri, Joseph C. // T H E Journal;Feb2006, Vol. 33 Issue 7, p18 

    The article discusses the threats posed by smart mobile phones to data security. More than 100 viruses now target smart phones running mobile operating systems from several high technology companies including Microsoft Corp. Consider the Cabir worm, which targets mobile phones running Symbian OS...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics