TITLE

Walled Off

AUTHOR(S)
GREENBERG, ANDY
PUB. DATE
December 2011
SOURCE
Forbes Asia;Dec2011, Vol. 7 Issue 14, p32
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports on new computer security measures adopted by the Chinese authority. In its efforts to block certain services the government does not approve, it is looking for certain security measures. The article also offers information on anticensorship and anonymity service Tor. It is stated how the Chinese government has been on the hunt for censorship circumvention tools.
ACCESSION #
69842249

 

Related Articles

  • Two-Factor Authentication Has One Big Endorsement: Google. Quittner, Jeremy // American Banker;2/14/2011, Vol. 176 Issue 24, p1 

    The article focuses on plans of Google Inc., the Internet search company, to add additional security measures by implementing a two-factor authentication for account access. Details of the verification plan are outlined. Comments on the security measures are offered from executives including...

  • Amazement as IT wolf turns into ID sheepdog. Tebbutt, David // Information World Review;Apr2006, Issue 223, p13 

    Presents an article about the challenges faced by web service providers concerning computer identity security issues. Efforts taken by Microsoft Corp. to prevent secure the identity of computer users; Comments on the development of the InfoCard program of the firm; Impact of the launch of the...

  • The Agora Internet. Filman, Robert E. // IEEE Internet Computing;Sep/Oct2005, Vol. 9 Issue 5, p4 

    Offers observation on the Internet marketplace. Parallels between the Internet's evolution and social interactions; Threat posed by computer crimes to the market; Mechanisms needed to protect the agora Internet.

  • Taking measures to block network blackmailers. Dipple, Chris // New Media Age;10/28/2004, p17 

    This article discusses a variety of measures that can be taken to counter an illegal online activity. The crime is characterized by a ransom note by email, shortly followed by the victims' servers being bombarded with huge volumes of traffic. To address this problem, Web sites can spread...

  • Are you in control of your data? Dempster, Ann // Money Marketing;11/28/2013, p49 

    The article examines how financial advisers can protect their client's data. According to the author, many firms are resorting to storing information through the Internet to better improve client data protection because this eliminates the risks associated with carrying around sensitive client...

  • DOWNTIME.  // Computer Weekly;7/6/2004, p52 

    This article reports on several developments from the computer industry. A supermarket shelf stacker from Southampton, England has been jailed for two years for trying to blackmail the Playboy Web site. Raids by police and FBI agents followed his threats to target Playboy customers if the soft...

  • Eliciting security requirements with misuse cases. Sindre, Guttorm; Opdahl, Andreas // Requirements Engineering;Feb2005, Vol. 10 Issue 1, p34 

    Use cases have become increasingly common during requirements engineering, but they offer limited support for eliciting security threats and requirements. At the same time, the importance of security is growing with the rise of phenomena such as e-commerce and nomadic and geographically...

  • Supply and Demand. Bryce, Robert // Interactive Week;10/15/2001, Vol. 8 Issue 40, p36 

    Discusses the advantages of computer security demand on compensations in the information technology sector in the U.S. Security operations for the Internet industry; Spendings on wireless device usage in 2005.

  • CipherCloud Acquires CloudUp for Data Loss Prevention Technology. Kerner, Sean Michael // eWeek;1/15/2014, p1 

    The article reports on the move of CipherCloud, a cloud security vendor, to acquire privately held stealth startup CloudUp Networks. CipherCloud acquired CloudUp in order to enhance its data loss prevention (DLP) capabilities that provide improved security to cloud users. The parties decided not...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics