| |
Current Topic: Computer Security |
|
Topic: Computer Security |
1:08 am EDT, Aug 31, 2004 |
Old school british anti software piracy ads. One encourages you to rat out your school teachers for cash. Classic Anti-Piracy Ads |
|
Topic: Computer Security |
12:29 am EDT, Jun 17, 2004 |
In today's mail, I received an advertisement from Comcast offering high-speed internet service at only $19.99 per month for 6 months. After mentioning 3 Mbps download speed and other features, it reads: Now available! Ask us how to connect up to 5 computers with Home Networking Go wireless, share your printer and files and feel safer with our built-in firewall! |
|
Topic: Computer Security |
1:58 am EDT, May 11, 2004 |
How vulnerable is the United States to attack from cyberpsace? How imminent is the threat? Many experts believe the clock is already ticking, and that America is already fighting a ... Cyberwar! This PBS Frontline program recently aired on television. You can watch the full program (52 minutes) online in streaming video (QuickTime, Windows Media, Real Player). cyber war! |
|
Computer Systems Spur Growth for Contractors |
|
|
Topic: Computer Security |
1:07 am EDT, May 11, 2004 |
CSC recently won a contract to design and produce identification badges containing biometric data and a system to scan the badges for the staff of the Coalition Provisional Authority. "A lot of our business is this nice confluence of our information technology and our international presence," Cofoni said. This might be an interesting contract to follow, if it weren't for the fact that the CPA has only a month to live ... Computer Systems Spur Growth for Contractors |
|
ACM Classic: Reflections on Trusting Trust |
|
|
Topic: Computer Security |
1:37 am EDT, Apr 13, 2004 |
Each year, ACM's most prestigious technical award, the Turing Award, is given to an individual selected for lasting and major contributions of a technical nature made to the computing community. In 1983, Ken Thompson received the ACM Turing Award. This was his lecture. I am a programmer. On my 1040 form, that is what I put down as my occupation. As a programmer, I write programs. I would like to present to you the cutest program I ever wrote. I will do this in three stages and try to bring it together at the end. ... The moral is obvious. You can't trust code that you did not totally create yourself. ACM Classic: Reflections on Trusting Trust |
|
National Cyber Security Partnership |
|
|
Topic: Computer Security |
8:21 pm EDT, Apr 4, 2004 |
Following the release of the National Strategy to Secure Cyberspace, this public-private partnership was established to develop shared strategies and programs to better secure and enhance America's critical information infrastructure. Three of five task force reports are now available. The next two reports will be released in early April. The reports are: Awareness for Home Users and Small Businesses; Cyber Security Early Warning; Security Across the Software Development Lifecycle Task Force; Technical Standards and Common Criteria; Corporate Governance. From the most recent report: "Software security improvement requires: * Higher education to do a better job of teaching future software developers. * The software industry to make security an integral part of the design process. * Policymakers and others to create incentives that reward those who create secure software code. * The software industry to come together on a common method of managing the process of patching software when insecurities are discovered. Every accredited undergraduate computer science program should be required to have a mandatory course in computer security that includes a laboratory component. The Georgia Tech undergraduate curriculum, described at http://www.cs.gatech.edu/academics/undergraduate.html does not even mention the word 'security', let alone require a course in the subject. National Cyber Security Partnership |
|
Third Annual Workshop on Economics and Information Security |
|
|
Topic: Computer Security |
2:05 am EST, Mar 25, 2004 |
How much should we spend to secure our computer systems? Can we determine which investments will provide the best protection? How will we know when we've reached our goals? Can market forces ensure that firms will act to improve security? We encourage economists, computer scientists, security specialists, business school faculty, and industry experts to submit original research to the 2004 conference. Among past and suggested topics are: information sharing; reputation systems; economics of pseudonyms; case studies; ... All good questions! Note that it's now past the deadline to submit papers; the agenda is forthcoming. The conference committee includes Ross Anderson, Jean Camp, Li Gong, Andrew Odlyzko, Bruce Schneier, Hal Varian, and others. Third Annual Workshop on Economics and Information Security |
|
Cyber Security in an Era of Technological Change |
|
|
Topic: Computer Security |
2:04 pm EST, Mar 6, 2004 |
This report reflects the findings of a conference on cyber security. the focus was on three themes: What are the threats and what is the matrix of possible responses? How should Europe and the United States cooperate? How should the public and the private sector work together? Cyber Security in an Era of Technological Change |
|
The Hard Way to Learn That the Internet Is Not Disneyland |
|
|
Topic: Computer Security |
10:32 am EST, Feb 8, 2004 |
Average Americans tend to see the Internet as safer and more secure than it is partly because they operate under a simplified notion of what the Net is. As John Edwards might say, "Let's hear it for Average Americans!" The Hard Way to Learn That the Internet Is Not Disneyland |
|
Report Says Internet Voting System Is Too Insecure to Use |
|
|
Topic: Computer Security |
2:10 am EST, Jan 23, 2004 |
A new $22 million system to allow soldiers and other Americans overseas to vote via the Internet is inherently insecure and should be abandoned, according to members of a panel of computer security experts asked by the government to review the program. In attempting to play down the critique of the system, Mr. Flood of the Defense Department called it a "minority report." Ha! Oh, the irony ... Report Says Internet Voting System Is Too Insecure to Use |
|