Create an Account
username: password:
 
  MemeStreams Logo

What questions are you asking yourself?

search

Jeremy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Jeremy's topics
Arts
  Literature
   Classical
   Fiction
   Horror
   Non-Fiction
   Sci-Fi/Fantasy Literature
  Movies
   Movie Genres
    Action/Adventure
    Cult Films
    Documentary
    Drama
    Horror
    Independent Films
    Film Noir
    Sci-Fi/Fantasy Films
    War
  Music
   Music Styles
    Classical
    Electronic Music
    Rap & Hip Hop
    IDM
    Jazz
    World Music
  TV
   TV Documentary
   TV Drama
   SciFi TV
Business
  Finance & Accounting
  Industries
   Tech Industry
   Telecom Industry
  Management
  Markets & Investing
Games
  Video Games
   PC Video Games
   Console Video Games
Health and Wellness
  Medicine
Home and Garden
  Cooking
  Entertaining
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   California
    SF Bay Area
   Events in Washington D.C.
   News for Washington D.C.
   Georgia
    Atlanta
     Atlanta Events
Science
  Biology
  History
  Math
  Medicine
  Nano Tech
  Physics
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Technology
  Biotechnology
  Computers
   (Computer Security)
    Cryptography
   PC Hardware
   Human Computer Interaction
   Computer Networking
   Macintosh
   Software Development
    Open Source Development
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

SERVE Analysis
Topic: Computer Security 2:05 am EST, Jan 23, 2004

This report is a review and critique of computer and communication security issues in the SERVE voting system (Secure Electronic Registration and Voting Experiment), an Internet-based voting system being built for the US Department of Defense's FVAP (Federal Voting Assistance Program).

Here is the report by Avi Rubin, Barara Simons, David Wagner, and David Jefferson.

SERVE Analysis


The Perils of Online Voting
Topic: Computer Security 2:02 am EST, Jan 23, 2004

The advantages of the Pentagon's Internet voting system would be far outweighed by the dangers it would pose.

There is every reason to believe that if federal elections can be tampered with, they will be. Until the vulnerabilities they identified are eliminated, the risks are too great.

"Just Say No to SERVE," says the New York Times.

The Perils of Online Voting


Security and Privacy in Ubiquitous Computing
Topic: Computer Security 11:39 am EST, Jan  3, 2004

Like most information technologies, Mobile and Ubiquitous Computing carries a number of security and privacy implications. We feel that care should be taken to consider these issues when designing Ubicomp systems. In this report we will enumerate a number of the privacy concerns in Ubicomp and provide a philisophical discussion of the importance of addressing these problems. In considering these problems we have found that a number of Ubicomp techniques are in fact well suited to solving security and privacy problems that arise in Ubicomp. We will discuss some of these techniques in the hope of inspiring further consideration. Systems described include a secure RF-ID system, an architecture for setting privacy levels based on context, and a wearable cryptographic authenticator.

This is an old paper, but Georgia Tech has removed it from the Google index. It can be found in the Wayback machine index, but not displayed from the archive because of the robots.txt exclusion.

Security and Privacy in Ubiquitous Computing


Finding and Fixing Vulnerabilities in Information Systems
Topic: Computer Security 11:13 pm EST, Dec 10, 2003

The Vulnerability Assessment and Mitigation (VAM) methodology helps to think beyond known vulnerabilities and head off surprise attacks.

Finding and Fixing Vulnerabilities in Information Systems


The Global CSO Council
Topic: Computer Security 9:33 am EST, Nov 13, 2003

The Global Council of CSOs is a think tank comprised of a group of influential corporate, government and academic security experts dedicated to raising the awareness of online security issues.

The Council encourages dialogue and action to meet the new challenges of online security.

The Council focuses on defining the role CSOs should take in corporate, national security, and future technology development.

The Global CSO Council


Tech Security Chiefs Form Alliance
Topic: Computer Security 9:32 am EST, Nov 13, 2003

Nearly a dozen top technology luminaries are lending their star power to a new think-tank that will look for ways to elevate the status of chief security officers in the private sector, a move that they say will go a long way toward improving Internet security.

The Global Council of Chief Security Officers was formed by former White House cybersecurity adviser Howard Schmidt, who said it helps fulfill a promise he made after leaving the Bush administration earlier this year to make Internet security a top issue in the business community.

Schmidt assembled a group with an array of impressive credentials ... including Whitfield Diffie and Vint Cerf.

Tech Security Chiefs Form Alliance


Talking with: Security Expert Mich Kabay
Topic: Computer Security 12:15 am EDT, Oct 22, 2003

Adaptive attackers, novice computer users, indifferent management ... it's no wonder our defensive mechanisms need continuous refinement.

Norwich University ... has an information warfare laboratory where students do lab work on defensive countermeasures.

... Users don't take security seriously. Management does not take security seriously. ... We give people dangerous, unprotected tools and expect novices to install and configure them.

... electronic voting ... not hopeless, but it is very difficult.

... some of the COTS software being sold should be qualified as beta versions ... fundamental designs are flawed.

Talking with: Security Expert Mich Kabay


British man cleared of hacking US port computer
Topic: Computer Security 11:41 pm EDT, Oct 20, 2003

A British court cleared a teenager today of hacking into the computer of the port of Houston, Texas, after the youth testified that his computer had been taken over by someone else to mount the attack.

Caffrey had insisted that, although the infiltration was triggered from his computer, he was not behind it. He testified as an expert in his own defense, arguing that a hacker could have taken over his machine to mount the attack.

Outside the courtroom, the lanky teenager told TV reporters that he now hopes to get a job as a computer security consultant or programmer.

Just the world needs -- another inept computer security professional!

British man cleared of hacking US port computer


ISS Takes Wraps Off New Security Appliance
Topic: Computer Security 3:30 pm EDT, Oct 18, 2003

Internet Security Systems pulled out all of the stops Tuesday as it introduced the first in a new line of security appliances that simultaneously blocks viruses, malicious intrusions, worms and other threats to the well-being of a company's IT infrastructure.

At the launch event, ... George Gilder described the need for a unified approach to security, rather than an amalgam of stand-alone products.

Gilder: "When industry gives customers everything they could possibly need, then modularity is desirable. But when customers' needs are a long way from being met, then modularity is a problem."

Amid flashing lights, Klaxon horns, and front-loaders dumping firewalls into trash bins, a stage full of technology and business dignitaries [including Steve Forbes] talked about the need for a simple way to fight today's security indignities.

Huh? What did Gilder say? This seems like a scare tactic to convince customers they have to buy everything from one vendor. Attacking the very concept of modularity is a rather risky strategy.

ISS Takes Wraps Off New Security Appliance


CNN.com - Microsoft plans Windows overhaul to fight hackers - Oct. 16, 2003
Topic: Computer Security 4:49 pm EDT, Oct 16, 2003

] Microsoft promised to improve the way in which Windows
] manages computer memory to protect users against commonly
] exploited software flaws known as buffer overruns, which
] can trick Windows into accepting dangerous commands. Some
] of the most damaging attacks in recent months fall under
] this category.

MS deploys non-executable stack patch. (What year is it?)

CNN.com - Microsoft plans Windows overhaul to fight hackers - Oct. 16, 2003


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0