Skip Navigation

Scout Archives

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

(4 classifications) (22 resources)

Computer networks -- Security measures

Classification
Evaluation. (1)
Software (2)
Study and teaching (1)
United States (9)

Resources

Electronic Surveillance

The FBI maintains a Web site (1) that explains the purposes and ramifications of the Communications Assistance for Law Enforcement Act (CALEA). In addition to discussing the telecommunication industry's role in supporting the act, the site defines electronic surveillance and offers several documents regarding associated legal issues. An excellent source for government surveillance information...

https://scout.wisc.edu/report/nsdl/met/2003/0523#TopicInDept...
Final Implementation Report and Recommendations of the Committee on ICANN Evolution and Reform

On October 22, 2002, an attack on the thirteen servers that act as the backbone of the Internet was carried out, briefly disabling nine of them. This drew attention to the often criticized organization that operates these servers, the Internet Corporation for Assigned Names and Numbers (ICANN). Coincidentally, an October 2, 2002 report from ICANN addresses the issue of internet security. The...

http://archive.icann.org/en/committees/evol-reform/final-imp...
Freelan

Freelan is VPN software that provides a virtual LAN that connects computers anywhere in the world as if they were on the same network switch. Many of the VPN options previously covered in the Scout Report (for example, Psiphon in the 02-16-2018 issue, ProtonVPN in the 08-17-2018 issue, and TunnelBear in the 03-11-2016 issue) act as encrypted proxies that hide users' network traffic and make their...

https://www.freelan.org/
Internet Guide

The Internet Guide is a no-nonsense site intended for Internet newbies. It consists of several short articles that discuss the basics of Internet navigation, common terms and phrases, Netiquette, and much more. Some specific technologies are also mentioned, such as Telnet and newsgroups. The Guide occasionally refers to various products or services; however, it does not endorse any particular...

https://www.internet-guide.co.uk/
Internet Quarantine: Requirements for Containing Self-Propagating Code

Appearing at the INFOCOM conference in April 2003, this research paper provides insight into critical factors necessary to contain outbreaks of self-propagating code on the Internet. Citing the outbreak of the Code-Red worm in 2001 as an example, the authors justify the need for better methods of quickly controlling the spread of malicious code and minimizing damage. A couple scenarios for the...

https://catalog.caida.org/details/paper/2003_quarantine/
KeePass Password Safe 1.16

Password security these days is of the utmost importance, and users who wish to remain diligent about such matters will appreciate learning about KeePass. This utility stores users' passwords in one encrypted database, and visitors can also use their built-in password generator. This version is compatible with computers running Windows 98 and newer.

https://www.dominik-reichl.de/software.html
Markle Foundation: The Task Force on National Security in the Information Age

The main feature of this Web site is the report titled "Protecting America's Freedom in the Information Age," released in October 2002. It examines how to effectively use information technology to collect and analyze information pertinent to national security. The report states that current government practices are insufficient in this area, and it is laden with recommendations for improving the...

https://www.markle.org/national-security/
Protecting Applications against Malice Using Adaptive Middleware

Security in distributed computing systems is a very important area of research, especially as malicious behavior is a growing cause of concern for businesses and organizations. This paper addresses an emerging method of maintaining security in untrustworthy environments. Until recently, the operating system was the only means of protecting data; the authors discuss a more elaborate technique of...

https://www.dre.vanderbilt.edu/~schmidt/PDF/IFIPCSES.pdf
Screenshot
ProtonVPN

ProtonVPN is a virtual private network service produced by the company that runs the ProtonMail high-security email service. ProtonVPN is similarly designed to be a high-security VPN suitable for journalists and political activists. The service exclusively uses ciphers designed for Perfect Forward Secrecy, which means that a compromised encryption key cannot be used to decrypt past sessions....

https://protonvpn.com
Report: Pro-Islamic Hackers Gear up for Cyberwar

An October 29, 2002 news article in USA Today describes a recent surge in activity of politically motivated hackers and cyber terrorists. The attacks, which range from Web site defacements to viruses and worms, are probably being perpetrated by individuals opposed to the US war on terrorism and action in Iraq.

http://usatoday30.usatoday.com/tech/news/computersecurity/20...
← Previous Next →