Skip Navigation

Scout Archives

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

Computer security -- Evaluation.

Resources

BlackHat Media Archives

This massive archive of presentations is offered for "the world wide computer security community." The archive can be accessed at no cost, and mainly consists of slide presentations from BlackHat conferences and conventions. These events began in 1997 to help professionals assess potential risks and recognize areas most vulnerable to security breaches. The material available in the archive...

https://www.blackhat.com/html/archives.html
Bruce Schneier: Crypto-Gram Newsletter

Crypto-Gram is a "free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise." It is published on the fifteenth of every month by the founder of a network security company. Several 2003 issues have focused on cyber-terrorism, the risks it poses, and possible defenses from it. The articles also provide perspective -- for example, the author...

https://www.schneier.com/crypto-gram/
Internet Quarantine: Requirements for Containing Self-Propagating Code

Appearing at the INFOCOM conference in April 2003, this research paper provides insight into critical factors necessary to contain outbreaks of self-propagating code on the Internet. Citing the outbreak of the Code-Red worm in 2001 as an example, the authors justify the need for better methods of quickly controlling the spread of malicious code and minimizing damage. A couple scenarios for the...

https://catalog.caida.org/details/paper/2003_quarantine/