Skip Navigation

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

(2 classifications) (12 resources)

Computer security -- United States

Evaluation. (1)
Periodicals (2)

View Resource Web Spoofing: An Internet Con Game

The Safe Internet Programming group at the Princeton University Department of Computer Science in 1996 published a paper on the practice known as "web spoofing," through which an attacker intervenes between an end-user browsing the Web and real Web sites. The attacker sets up a shadow copy of the Web, and as users request pages from sites they will receive pages from the attacker's site instead....
View Resource The PRIVACY Forum

Begun in 1992, the PRIVACY Forum is a moderated digest of "the discussion and analysis of issues relating to the general topic of privacy (both personal and collective) in the 'information age'." It is sponsored by the ACM (Association for Computing Machinery), internetMCI and Cisco Systems, but they do not influence its content. The digest mailing itself is a once- or twice-weekly publication,...
View Resource National Security Agency

The National Security Agency's (NSA) Web site provides information about NSA's mission and activities. NSA is the nation's cryptologic organization and employs this country's premier codemakers and codebreakers. Under its two national missions, NSA collects and processes foreign signals intelligence and it is also responsible for providing leadership, products and services to protect classified...
View Resource Federal Trade Commission: Privacy Initiatives

The US Federal Trade Commission provides this site, highlighted by the availability of its Privacy Online: A Report to Congress. In addition, the site offers tips on how to protect personal information, transcripts of relevant congressional testimony, useful information about protecting your privacy while you "travel" the Net, and FTC pamphlets on consumer protection and privacy information, among...
View Resource Safeguarding Your Technology: Practical Guidelines for Electronic Education Information Security

This new publication from the National Center for Education Statistics (NCES) explains the necessity for developing a comprehensive and customized electronic security policy and offers guidance to educational administrators in devising and implementing one. The report is organized in ten chapters, addressing topics such as risk assessment; development and implementation of security policy;...
View Resource Copy Protection

With the recent shut down of the peer-to-peer file sharing utility Audiogalaxy, copy protection of all kinds of data is a very hot topic. Distribution of music, movies, and software is running rampant, and many believe the solution lies in better copy protection. To learn the basics of copy protection, visit Link Data Security (1). This company specializes in secure products that reduce piracy,...
View Resource Princeton University Department of Computer Science: Safe Internet Programming

The Safe Internet Programming (SIP) group at the Princeton University Department of Computer Science offers their publications, research, and news about Internet security.
View Resource Report: Pro-Islamic Hackers Gear up for Cyberwar

An October 29, 2002 news article in USA Today describes a recent surge in activity of politically motivated hackers and cyber terrorists. The attacks, which range from Web site defacements to viruses and worms, are probably being perpetrated by individuals opposed to the US war on terrorism and action in Iraq.
View Resource Federal Trade Commission: Online Privacy

The US Federal Trade Commission provides its Privacy Online: A Report to Congress. This 43 page monograph "provides an assessment of the effectiveness of self-regulation as a means of protecting consumer privacy on the World Wide Web,... based on a comprehensive online survey of the information practices of commercial Web sites, including sites directed to children, conducted in March 1998; an...
View Resource Computer Security Resource Center (CSRC): History of Computer Security

This Web site serves as a collection of seminal research papers that "every serious student of computer security should read." Mostly from the 1970's but also stretching into the '80s, the papers were first collectively distributed at the 1998 National Information Systems Security Conference but are now offered online to make them more widely available. Each paper contributed to computer security...
Next →