Skip Navigation

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

Computer security -- Evaluation.

Resources
View Resource SecurityFocus

This news service from SecurityFocus is an excellent resource to learn about important computer security warnings and alerts. The Web site keeps track of many widely used software applications, while reporting known vulnerabilities as they are found. Viruses and worms are another key topic that receives significant attention. Several columns offer expert advice and tips to efficiently use and...

https://www.securityfocus.com/
View Resource Internet Quarantine: Requirements for Containing Self-Propagating Code

Appearing at the INFOCOM conference in April 2003, this research paper provides insight into critical factors necessary to contain outbreaks of self-propagating code on the Internet. Citing the outbreak of the Code-Red worm in 2001 as an example, the authors justify the need for better methods of quickly controlling the spread of malicious code and minimizing damage. A couple scenarios for the...

http://www.caida.org/publications/papers/2003/quarantine/
View Resource BlackHat Media Archives

This massive archive of presentations is offered for "the world wide computer security community." The archive can be accessed at no cost, and mainly consists of slide presentations from BlackHat conferences and conventions. These events began in 1997 to help professionals assess potential risks and recognize areas most vulnerable to security breaches. The material available in the archive...

http://www.blackhat.com/html/archives.html
View Resource Bruce Schneier: Crypto-Gram Newsletter

Crypto-Gram is a "free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise." It is published on the fifteenth of every month by the founder of a network security company. Several 2003 issues have focused on cyber-terrorism, the risks it poses, and possible defenses from it. The articles also provide perspective -- for example, the author...

https://www.schneier.com/crypto-gram/