Skip Navigation

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

(4 classifications) (22 resources)

Internet -- Security measures

Periodicals (2)
Research (2)
Societies, etc. (1)
Software. (13)

View Resource Web Spoofing: An Internet Con Game

The Safe Internet Programming group at the Princeton University Department of Computer Science in 1996 published a paper on the practice known as "web spoofing," through which an attacker intervenes between an end-user browsing the Web and real Web sites. The attacker sets up a shadow copy of the Web, and as users request pages from sites they will receive pages from the attacker's site instead....
View Resource Electronic Privacy Information Center (Last reviewed in The Scout Report on June 13, 1997)

When the Electronic Privacy Information Center (EPIC) was started in 1994, there were already substantial privacy issues surrounding the collection and use of electronic data at play. Since that time, such issues have grown exponentially in their scope, and EPIC continues to perform valuable research in the area. A good place to start exploring their site is right on the homepage, namely their...
View Resource Symantec: Hoaxes

Periodically a series of "important messages" about new email viruses make their way through various mailing lists. While savvy Internet users can usually immediately spot these hoaxes, they can be both intimidating and frightening to neophytes (not to mention the bandwidth wasted when the messages are passed on to other users.) One of the better sites that track both email and other computer...
View Resource Federal Trade Commission: Privacy Initiatives

The US Federal Trade Commission provides this site, highlighted by the availability of its Privacy Online: A Report to Congress. In addition, the site offers tips on how to protect personal information, transcripts of relevant congressional testimony, useful information about protecting your privacy while you "travel" the Net, and FTC pamphlets on consumer protection and privacy information, among...
View Resource Statement for the Record before the Joint Economic Committee on Cyber Threats and the US Economy

The Central Intelligence Agency (CIA) has released this statement by John A. Serabian, Jr., Information Operations Issue Manager, following the recent attacks by hackers on popular consumer Websites (For more information on the attacks, see the February 10, 2000 Scout Report for Business and Economics). The statement, given on February 23, 2000, details types of cyber threats and the CIA's...
View Resource The Information Warfare Site (IWS)

Based in the UK, IWS is "an online resource that aims to stimulate debate about a range of subjects from information security to information operations and e-commerce," with an emphasis on offensive and defensive information operations. To these ends, it offers a number of resources, including selected documents, articles, and online journals that relate to twelve topics, such as computer...
View Resource Two on the Code Red Virus: The Spread of the Code-Red Worm

During the final weeks of July, a computer worm known as Code Red spread to over 350,000 computers on six continents. The two sites listed above provide details and analysis of the worm incident. This site, from University of California's Cooperative Association for Internet Data analysis (CIDA), provides a wealth of data on the origin and spread of Code Red. A neat feature is the animation of the...
View Resource CERT Coordination Center

The CERT Coordination Center is part of the Software Engineering Institute at Carnegie Mellon University. Its primary function is to work with industry to identify and eliminate Internet security vulnerabilities. Additionally, the center analyzes business and personal software to find potentially dangerous flaws that could compromise the system, meaning that both corporate and home users can...
View Resource Princeton University Department of Computer Science: Safe Internet Programming

The Safe Internet Programming (SIP) group at the Princeton University Department of Computer Science offers their publications, research, and news about Internet security.
View Resource TCPA: Trusted Computing Platform Alliance

The Trusted Computing Platform Alliance (TCPA) is one of the most high-profile operations for the development and adoption of an industry standard for personal computer security. The main participants in the TCPA are Compaq, HP, IBM, Intel, and Microsoft. This Web site has many documents written for or about the alliance. The most significant resource is the latest version of the main...
Next →