TITLE

PROCESS AS A PROBLEM

AUTHOR(S)
Bradner, Scott
PUB. DATE
December 2000
SOURCE
Network World;12/18/2000, Vol. 17 Issue 51, p40
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on privacy concerns regarding the Internet as more personal data is becoming online. Impact of system management on the security of Web sites and computer networks; Range of personal data that are increasingly stored on the Internet; Different threats to Internet security.
ACCESSION #
4002924

 

Related Articles

  • Wild, Unsubstantiated Predictions: The Future of Computer and Network Security. Aycock, John // Journal of Military & Strategic Studies;2012, Vol. 14 Issue 2, p1 

    The article reports on the predictions about the future of computer and network security over the short term leading to medium term. It explores the latest technical and social context for cybersecurity. It identifies some key trends that underlie the future of attack and defense, such as the...

  • SECURITY.  // Telecom Asia;Jun2005, Vol. 16 Issue 6, p68 

    Reports on the challenges confronting network security. Potential of a hacker to bring down the entire Internet with 100 lines of code; Impact of the current practice of putting security at the edge of the network on network security; Impossibility of scaling by putting all the security at the...

  • Reducing False Positives in an Anomaly-Based NIDS. Hatamikhah, Saeide; Laali, Mohammad // Proceedings of the International Conference on Information Warfa;2012, p358 

    Internet and computer networks are facing an increasing number of security threats. With new types of attacks that appear continuously, the development of flexible and adaptive security is a serious challenge. In this field, approaches of network-based intrusion detection are ideal techniques to...

  • How to Save the Internet.  // Wilson Quarterly;Summer2006, Vol. 30 Issue 3, p83 

    The article comments on the article The Generative Internet, by Jonathan L. Zittrain, published in the May 2006 issue of Harvard Law Review. It is not corporate ogres or bloodsucking regulators that pose the chief danger, according to the author. Today's rapidly proliferating threats to Internet...

  • IP Security.  // Network Dictionary;2007, p260 

    A definition of the term "IP Security" is presented. The term refers to a group of protocols that provides security services at the network layer by enabling a system to select required security protocols, determine the algorithms to use for the services and put in place any cryptographic keys...

  • Math foundations fortify networks, safeguard personal communications. Coffee, Peter // PC Week;06/16/97, Vol. 14 Issue 24, p107 

    Explores the principles that protect sensitive data on computer networks. The foundational nature of network security; Authentication; Integrity; Confidentiality; Access control. INSET: Reference corner: Network security, K. Walters..

  • Management of Security and Security for Management Systems. Westphall, Carlos; Mueller, Peter // Journal of Network & Systems Management;Sep2010, Vol. 18 Issue 3, p241 

    An introduction to the journal is presented in which the editor discusses an article on network security schemes that use traffic redistribution techniques to become more robust against attacks, a description of the normal behavior of computer networks that are based on Support Vector Data...

  • Security Domains: Key Management in Large-Scale Systems. Michener, John R.; Acar, Tolga // IEEE Software;Sep/Oct2000, Vol. 17 Issue 5, p52 

    Describes the use of a security domain (SD) method in dealing with logical keying structures for data protection in large-scale computer systems. Comparison on the use of public and private key systems to implement a communication system; Assumptions and requirements for the SD method;...

  • BRAINSTORM.  // Wireless Design & Development;Mar2009, Vol. 17 Issue 3, p24 

    The article provides answers to a question on what data security threats will be most common in 2009 and tools that are available today to protect company networks.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics