Skip Navigation

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

(10 classifications) (38 resources)

Computer security

Classification
Blogs (1)
Evaluation. (4)
OECD countries (1)
Periodicals (1)
Research (9)
Software (32)
Standards. (2)
Study and teaching (3)
Technological innovations. (6)
United States (15)

Resources
View Resource TCPA: Trusted Computing Platform Alliance

The Trusted Computing Platform Alliance (TCPA) is one of the most high-profile operations for the development and adoption of an industry standard for personal computer security. The main participants in the TCPA are Compaq, HP, IBM, Intel, and Microsoft. This Web site has many documents written for or about the alliance. The most significant resource is the latest version of the main...

https://mako.cc/talks/20030416-politics_and_tech_of_control/...
View Resource Absolute Shield Internet Eraser Lite 2.32

This application will help users protect their privacy by completing cleaning up all the records left by Internet browsing and various computer activities. Fully integrated with Internet Explorer (from version 4.0 and up), Eraser Lite can erase the browser cache, history, cookie, typed URLs, recent documents, the temporary folder, and so on. Additionally, all of these files will be completely...

http://www.internet-track-eraser.com/
View Resource A Net Meltdown is Inevitable

On October 22, 2002, an attack on the thirteen servers that act as the backbone of the Internet was carried out, briefly disabling nine of them. This drew attention to the often criticized organization that operates these servers, the Internet Corporation for Assigned Names and Numbers (ICANN). This news article argues that bad practices and insufficient safety precautions of ICANN may soon lead...

http://www.zdnet.com/article/a-net-meltdown-is-inevitable/
View Resource Final Implementation Report and Recommendations of the Committee on ICANN Evolution and Reform

On October 22, 2002, an attack on the thirteen servers that act as the backbone of the Internet was carried out, briefly disabling nine of them. This drew attention to the often criticized organization that operates these servers, the Internet Corporation for Assigned Names and Numbers (ICANN). Coincidentally, an October 2, 2002 report from ICANN addresses the issue of internet security. The...

http://archive.icann.org/en/committees/evol-reform/final-imp...
View Resource Protecting Applications against Malice Using Adaptive Middleware

Security in distributed computing systems is a very important area of research, especially as malicious behavior is a growing cause of concern for businesses and organizations. This paper addresses an emerging method of maintaining security in untrustworthy environments. Until recently, the operating system was the only means of protecting data; the authors discuss a more elaborate technique of...

https://dist-systems.bbn.com/papers/2002/IFIPCSES/IFIPCSES.p...
View Resource Report: Pro-Islamic Hackers Gear up for Cyberwar

An October 29, 2002 news article in USA Today describes a recent surge in activity of politically motivated hackers and cyber terrorists. The attacks, which range from Web site defacements to viruses and worms, are probably being perpetrated by individuals opposed to the US war on terrorism and action in Iraq.

http://usatoday30.usatoday.com/tech/news/computersecurity/20...
View Resource Internet Guide

The Internet Guide is a no-nonsense site intended for Internet newbies. It consists of several short articles that discuss the basics of Internet navigation, common terms and phrases, Netiquette, and much more. Some specific technologies are also mentioned, such as Telnet and newsgroups. The Guide occasionally refers to various products or services; however, it does not endorse any particular...

http://www.internet-guide.co.uk/
View Resource Markle Foundation: The Task Force on National Security in the Information Age

The main feature of this Web site is the report titled "Protecting America's Freedom in the Information Age," released in October 2002. It examines how to effectively use information technology to collect and analyze information pertinent to national security. The report states that current government practices are insufficient in this area, and it is laden with recommendations for improving the...

https://www.markle.org/national-security
View Resource SecurityFocus

This news service from SecurityFocus is an excellent resource to learn about important computer security warnings and alerts. The Web site keeps track of many widely used software applications, while reporting known vulnerabilities as they are found. Viruses and worms are another key topic that receives significant attention. Several columns offer expert advice and tips to efficiently use and...

http://www.securityfocus.com/
View Resource Architectures for Intrusion Tolerant Database Systems

The Cyber Security Group at Pennsylvania State University is developing database software that can detect "attacks by malicious transactions" and repair the database with no interruption. This research paper proposes five different schemes for implementing such a system, with each one building on the previous. Some of the main goals for the schemes are automatic damage repair, attack isolation to...

https://s2.ist.psu.edu/paper/itdb-archs.pdf
← Previous Next →