A Web lesson learned

Cox, John
July 1997
Network World;07/28/97, Vol. 14 Issue 30, p1
Trade Publication
Focuses on the lessons from the US Department of Justice's experience with the August 16, 1996 hackers' attack on its Web site. Importance of relying on one's self in implementing Web security measures; Dangers in participating in multisite networks; Advantage of hiring individual system integrators instead of large systems; Importance of clarifying and centralizing site authority.


Related Articles

  • Only you can prevent computer intrusions. Koerner, Brendan I. // U.S. News & World Report;11/22/99, Vol. 127 Issue 20, p50 

    Discusses the efforts of the United States Justice Department to prevent computer hacking. Addition of an Internet Do's and Don'ts section to its Kidspage web site; funding to the Information Technology Association of America to support the Cybercitizen Partnership, a public-private alliance to...

  • IF YOU BUILD IT...THEY WILL HACK IT.  // Curriculum Administrator;Dec2001, Vol. 36 Issue 11, p17 

    Reports the hacking of a computer system of an online charter school by a student in Perris, California. Investigation on the intent of the youth for hacking the system; Charges filed against the accused; Impact of incident on online learning.

  • Hackers Charged.  // Database & Network Journal;Aug2008, Vol. 38 Issue 4, p25 

    The article reports on the charges filed against 11 men by the U.S. Department of Justice for their alleged involvement in the hacking of nine companies, stealing more than 40 million credit and debit card numbers. The author stated that the charged men were alleged to have broken into the...

  • Device Identification Could Prevent Majority of Network Attacks.  // Software World;Sep2006, Vol. 37 Issue 5, p26 

    The article reports that Phoenix Technologies Ltd. has released Trusted Strategies' computer network security research report entitled "Network Attacks: Analysis of Department of Justice Prosecutions 1999-2006". Majority of the network attacks were made possible by stolen identification and...

  • IT SUMMIT LETS GOOD GUYS DO THE HACKING. Jackson, Tom // Crain's Cleveland Business;9/27/2004, Vol. 25 Issue 39, p1 

    This article reports that the conference, co-sponsored by anti-hacking groups such as the Cleveland Honeynet Project and the Northern Ohio Chapter of Infragard, will feature speakers from law enforcement and computer companies and a" hackathon" to let attendees try their hands at being the bad...

  • DOJ forms unit to target online crimes.  // Hill;12/8/2014, Vol. 21 Issue 122, p16 

    The article reports that the U.S. Department of Justice (DOJ) will form a Cybersecurity Unit in response to threats of online crimes.

  • Two Prestigious Newspapers Spoke Out Against DOJ. Woo, S. B. // Chinese American Forum;Jan-Mar2016, Vol. 31 Issue 3, p29 

    Reviews of articles published in newspapers speaking out against the U.S. Department of Justice (DOJ) are presented, wherein the articles include "The Rush to Find China's Moles" published in the periodical "The New York Times" in December 2015, and "Chinese-Americans are being caught mistakenly...

  • Blocking hacker attacks. Bradford, Michael // Business Insurance;2/19/2001, Vol. 35 Issue 8, p2 

    Reports that an Internet security expert has claimed that businesses in the United States can easily reduce the chances of having their computer systems attacked by hackers. Companies' common perception of hackers; Amount reserved by the government for fighting computer crimes; Factors that...

  • Internet innocence lost. Davis, Stephania H. // Telephony;03/30/98, Vol. 234 Issue 13, p5 

    Opinion. Focuses on the case of a Massachusetts teenager for violating Federal computer crime laws. Hacking into a Bell Atlantic/Nynex digital loop carrier system and disrupting phone service in Rutland; Cutting off of phone service to an airport tower in Worcester; Access into pharmacy...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics