Skip Navigation

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

(4 classifications) (25 resources)

Computer networks -- Security measures

Classification
Evaluation. (2)
Software (1)
Study and teaching (1)
United States (9)

Resources
View Resource Electronic Privacy Information Center (Last reviewed in The Scout Report on June 13, 1997)

When the Electronic Privacy Information Center (EPIC) was started in 1994, there were already substantial privacy issues surrounding the collection and use of electronic data at play. Since that time, such issues have grown exponentially in their scope, and EPIC continues to perform valuable research in the area. A good place to start exploring their site is right on the homepage, namely their...

https://epic.org/
View Resource The Information Warfare Site (IWS)

Based in the UK, IWS is "an online resource that aims to stimulate debate about a range of subjects from information security to information operations and e-commerce," with an emphasis on offensive and defensive information operations. To these ends, it offers a number of resources, including selected documents, articles, and online journals that relate to twelve topics, such as computer...

http://www.iwar.org.uk/
View Resource A Net Meltdown is Inevitable

On October 22, 2002, an attack on the thirteen servers that act as the backbone of the Internet was carried out, briefly disabling nine of them. This drew attention to the often criticized organization that operates these servers, the Internet Corporation for Assigned Names and Numbers (ICANN). This news article argues that bad practices and insufficient safety precautions of ICANN may soon lead...

https://www.zdnet.com/article/a-net-meltdown-is-inevitable/
View Resource Final Implementation Report and Recommendations of the Committee on ICANN Evolution and Reform

On October 22, 2002, an attack on the thirteen servers that act as the backbone of the Internet was carried out, briefly disabling nine of them. This drew attention to the often criticized organization that operates these servers, the Internet Corporation for Assigned Names and Numbers (ICANN). Coincidentally, an October 2, 2002 report from ICANN addresses the issue of internet security. The...

http://archive.icann.org/en/committees/evol-reform/final-imp...
View Resource Protecting Applications against Malice Using Adaptive Middleware

Security in distributed computing systems is a very important area of research, especially as malicious behavior is a growing cause of concern for businesses and organizations. This paper addresses an emerging method of maintaining security in untrustworthy environments. Until recently, the operating system was the only means of protecting data; the authors discuss a more elaborate technique of...

https://dist-systems.bbn.com/papers/2002/IFIPCSES/IFIPCSES.p...
View Resource Report: Pro-Islamic Hackers Gear up for Cyberwar

An October 29, 2002 news article in USA Today describes a recent surge in activity of politically motivated hackers and cyber terrorists. The attacks, which range from Web site defacements to viruses and worms, are probably being perpetrated by individuals opposed to the US war on terrorism and action in Iraq.

http://usatoday30.usatoday.com/tech/news/computersecurity/20...
View Resource Internet Guide

The Internet Guide is a no-nonsense site intended for Internet newbies. It consists of several short articles that discuss the basics of Internet navigation, common terms and phrases, Netiquette, and much more. Some specific technologies are also mentioned, such as Telnet and newsgroups. The Guide occasionally refers to various products or services; however, it does not endorse any particular...

http://www.internet-guide.co.uk/
View Resource Markle Foundation: The Task Force on National Security in the Information Age

The main feature of this Web site is the report titled "Protecting America's Freedom in the Information Age," released in October 2002. It examines how to effectively use information technology to collect and analyze information pertinent to national security. The report states that current government practices are insufficient in this area, and it is laden with recommendations for improving the...

https://www.markle.org/national-security
View Resource SecurityFocus

This news service from SecurityFocus is an excellent resource to learn about important computer security warnings and alerts. The Web site keeps track of many widely used software applications, while reporting known vulnerabilities as they are found. Viruses and worms are another key topic that receives significant attention. Several columns offer expert advice and tips to efficiently use and...

https://www.securityfocus.com/
View Resource Architectures for Intrusion Tolerant Database Systems

The Cyber Security Group at Pennsylvania State University is developing database software that can detect "attacks by malicious transactions" and repair the database with no interruption. This research paper proposes five different schemes for implementing such a system, with each one building on the previous. Some of the main goals for the schemes are automatic damage repair, attack isolation to...

https://s2.ist.psu.edu/paper/itdb-archs.pdf
Next →