Skip Navigation

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

(10 classifications) (38 resources)

Computer security

Classification
Blogs (1)
Evaluation. (4)
OECD countries (1)
Periodicals (1)
Research (9)
Software (32)
Standards. (2)
Study and teaching (3)
Technological innovations. (6)
United States (15)

Resources
View Resource Electronic Privacy Information Center (Last reviewed in The Scout Report on June 13, 1997)

When the Electronic Privacy Information Center (EPIC) was started in 1994, there were already substantial privacy issues surrounding the collection and use of electronic data at play. Since that time, such issues have grown exponentially in their scope, and EPIC continues to perform valuable research in the area. A good place to start exploring their site is right on the homepage, namely their...

https://epic.org/
View Resource Usability and privacy: a study of Kazaa P2P file-sharing

Published on the Hewlett Packard (HP) Web site, this report finds that a large percentage of Kazaa users have either accidentally or unknowingly shared their private files with everyone who has access to the Kazaa network. Conducted by Nathaniel S. Good of HP Labs and Aaron Krekelberg of the University of Minnesota, this study discloses shortcomings in the Kazaa software, which in turn, poses a...

http://www.hpl.hp.com/techreports/2002/HPL-2002-163.html?jum...
View Resource Symantec: Hoaxes

Periodically a series of "important messages" about new email viruses make their way through various mailing lists. While savvy Internet users can usually immediately spot these hoaxes, they can be both intimidating and frightening to neophytes (not to mention the bandwidth wasted when the messages are passed on to other users.) One of the better sites that track both email and other computer...

https://www.symantec.com/security_response/landing/risks/hoa...
View Resource Chaffing and Winnowing: Confidentiality without Encryption

This paper, provided by Ronald L. Rivest, professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, proposes a new method of computer message security. The method is called "chaffing and winnowing." Messages are broken up into packets and each packet is appended with a "message authentication code" (MAC). Then "chaff," fake packets with fake MACs, is...

http://people.csail.mit.edu/rivest/Chaffing.txt
View Resource ZDNet: The Biggest Computer Bugs of 1999!

This recent story from ZDNET News reviews the ten worst computer glitches of 1999, including the Pentium III processor serial number, "Exploding" email, the Hotmail security hole, the Melissa Virus, and the ColdFusion exploit. Each is briefly summarized, with links to three related stories or specials on ZDNet.

http://www.zdnet.com/article/the-biggest-computer-bugs-of-19...
View Resource Statement for the Record before the Joint Economic Committee on Cyber Threats and the US Economy

The Central Intelligence Agency (CIA) has released this statement by John A. Serabian, Jr., Information Operations Issue Manager, following the recent attacks by hackers on popular consumer Websites (For more information on the attacks, see the February 10, 2000 Scout Report for Business and Economics). The statement, given on February 23, 2000, details types of cyber threats and the CIA's...

https://www.cia.gov/news-information/speeches-testimony/2000...
View Resource The Information Warfare Site (IWS)

Based in the UK, IWS is "an online resource that aims to stimulate debate about a range of subjects from information security to information operations and e-commerce," with an emphasis on offensive and defensive information operations. To these ends, it offers a number of resources, including selected documents, articles, and online journals that relate to twelve topics, such as computer...

http://www.iwar.org.uk/
View Resource Two on the Code Red Virus: The Spread of the Code-Red Worm

During the final weeks of July, a computer worm known as Code Red spread to over 350,000 computers on six continents. The two sites listed above provide details and analysis of the worm incident. This site, from University of California's Cooperative Association for Internet Data analysis (CIDA), provides a wealth of data on the origin and spread of Code Red. A neat feature is the animation of the...

http://www.caida.org/research/security/code-red/
View Resource Copy Protection

With the recent shut down of the peer-to-peer file sharing utility Audiogalaxy, copy protection of all kinds of data is a very hot topic. Distribution of music, movies, and software is running rampant, and many believe the solution lies in better copy protection. To learn the basics of copy protection, visit Link Data Security (1). This company specializes in secure products that reduce piracy,...

https://scout.wisc.edu/report/nsdl/met/2002/0719
View Resource Cryptology ePrint Archive

The International Association for Cryptologic Research (IACR) maintains this archive of nearly 400 research papers on various topics in cryptology. Contents date back to 1996, and new material is posted most weeks. Papers generally describe original theories about a certain topic, analyses of cryptologic methods, or proofs of specific equations. Anyone can submit their research for possible...

https://eprint.iacr.org/
Next →