| |
Current Topic: Computer Security |
|
Feds Building Internet Monitoring Center |
|
|
Topic: Computer Security |
1:27 am EST, Feb 3, 2003 |
The Bush administration is quietly assembling an Internet-wide monitoring center to detect and respond to attacks on vital information systems and key e-commerce sites. The center, which has been in development for the past 15 months, is a key piece of the White House's national cybersecurity strategy and represents a major leap in the federal government's effort to achieve real-time tracking of the Internet's health. Feds Building Internet Monitoring Center |
|
IEEE Security & Privacy magazine |
|
|
Topic: Computer Security |
12:40 am EST, Dec 17, 2002 |
] Organizations relying on the Internet face significant ] challenges to ensure that their networks operate safely. ] And that their systems continue to provide critical ] services even in the face of attacks. ] ] Denial of service, worms, DNS, and router attacks are ] increasing. To help you stay one step ahead of these and ] other threats, the IEEE Computer Society is introducing a ] new periodical in 2003 IEEE Security & Privacy magazine. ] ] IEEE Security & Privacy will rethink the role and ] importance of networked infrastructure and help you ] develop lasting security solutions. In 2003, IEEE is offering a new publication that may be of interest to you. IEEE Security & Privacy magazine |
|
Survey on Information Infrastructure Security |
|
|
Topic: Computer Security |
11:02 pm EDT, Sep 29, 2002 |
RAND is helping the Institute for Information Infrastructure Protection to develop a national R&D agenda to protect the nation's existing information infrastructure. One way that we are doing this is via on-line surveys of different focus groups that either rely heavily on the existing infrastructure or develop products, services or technology for it. Two such groups are the academic researchers community and IT security hardware and software vendors. The survey should take no more than 30 minutes or so. Survey on Information Infrastructure Security |
|
Principles of Secure Network Systems Design |
|
|
Topic: Computer Security |
9:57 pm EDT, Sep 9, 2002 |
This new book establishes a comprehensive framework for network security design, unifying the many concepts and aspects of network security and enabling all users to employ a common security foundation. It is presented from the perspective of fundamental principles underlying networking, network control algorithms and security. "Principles of Secure Network Systems Design" presents the topic in three basic parts. Part one covers the basic background of network security and the current scope for security in all types of networks and organizations. Part two focuses on the essential nature of network security and a scientific methodology for secure network design. Lastly, part three discusses concrete applications of the design concepts with real world networks. Principles of Secure Network Systems Design |
|
Choosing Reputable Servents in a P2P network |
|
|
Topic: Computer Security |
9:49 am EDT, Sep 5, 2002 |
In this paper we propose an approach to P2P security where servents can keep track, and share with others, information about the reputation of their peers. Reputation sharing is based on a distributed polling algorithm by which resource requestors can assess the reliability of perspective providers before initiating the download. The approach nicely complements the existing P2P protocols and has a limited impact on current implementations. Furthermore, it keeps the current level of anonymity of requestors and providers, as well as that of the parties sharing their view on others' reputations. Choosing Reputable Servents in a P2P network |
|
Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages |
|
|
Topic: Computer Security |
11:54 pm EDT, Aug 14, 2002 |
Like no other book before it, Global Information Warfare illustrates the relationships and interdependencies of business and national objectives, of companies and countries, and of their dependence on advances in technology. This book sheds light on the "Achilles heel" that these dependencies on advanced computing and information technologies create. It underscores how hostile countries, business competitors, terrorists, hacktivists and others are waging Information Warfare (IW) against their adversaries. This may sound like science fiction, but it has been happening for years and continues to this day -- anyone and everyone can be a target and a casualty. Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages |
|
Cyberwar, Netwar and the Revolution in Military Affairs - Real Threats and Virtual Myths |
|
|
Topic: Computer Security |
8:35 am EDT, Aug 5, 2002 |
This will be the second time an International School on Disarmament and Research on Conflicts (ISODARCO) summer course will focus on information technologies and their relation to war and international relations. The course, on "Computers, Networks and Prospects for European and World Security", will be focused on Cyberwar (CW), Netwar (NW), the current Revolution in Military Affairs (RMA) and related issues. Issues of major importance in such a discussion are: the relation between computers and regional defense; the threat of "cyberterrorism" as well as "cyberwar"; new forms of group organization like "networks" and how information technology supports them; the impact of information technology developments on military doctrine and organization of military forces. Follow the "Principal Lecturers" link for lots of good references on the topic. Cyberwar, Netwar and the Revolution in Military Affairs - Real Threats and Virtual Myths |
|
Dynamic system defense for information warfare |
|
|
Topic: Computer Security |
8:14 am EDT, Aug 5, 2002 |
United States Patent: 6,408,391 Disclosed is a method and apparatus which includes a security computer system capable of deploying and monitoring software agents on one or more nodes of a network of computers. The agents on each node include a framework agent and either a misdirection mission or a defensive mission. Upon an intrusion detection mission sending information to the security computer system indicative of an actual or suspected misuse or intrusion, the security computer system can automatically take countermeasures against the suspected or actual intrusion or misuse. Automatic countermeasures include using a defensive countermeasure to increase an auditing level conducted by the intrusion detection mission. A misdirection countermeasure mission is used to misdirect requests of the suspected or actual intruder or misuser. An offensive countermeasure is used to send a chase mission to the suspected or actual intruder. The offensive chase mission can either be automatically dispatched or dispatched with human intervention. The computer system includes a monitor for monitoring by a human system administrator. Designed by Ms. Julie Huff, a systems architect at PRC (Northrup Grumman), who calls herself an "idea girl." Dynamic system defense for information warfare |
|
GAO: Critical Infrastructures At Great Risk [PDF] |
|
|
Topic: Computer Security |
9:16 pm EDT, Jul 24, 2002 |
The explosion in computer interconnectivity, while providing great benefits, also poses enormous risks. Terrorists or hostile foreign states could launch computer-based attacks on critical systems to severely damage or disrupt national defense or other critical operations. After reviewing the president's plan for homeland security, GAO found that many challenges remain. Among them: Developing a national critical infrastructure protection strategy. Improving analytical and warning capabilities. Improving information sharing. Addressing pervasive weaknesses in federal information security. The nation's critical infrastructures are sitting ducks, and people are whining about the stock market. How secure are your services? How many different ways can you drive to work? What if the US interstate highway system was closed for a month while telecom, television, radio, and electricity services were offline? Would that affect you? GAO: Critical Infrastructures At Great Risk [PDF] |
|
Forensic Examination of a RIM (BlackBerry) Wireless Device [PDF] |
|
|
Topic: Computer Security |
9:35 pm EDT, Jul 6, 2002 |
This document is intended to familiarize the investigator with various methodologies and tools available to perform a forensic examination of a RIM (BlackBerry) device. The procedures and tools presented are by no means all encompassing, but are intended to elicit design of custom tools by those more programmatically inclined. The methods contained within have been tested using an Exchange Edition RIM pager model 950 and an Exchange Edition RIM handheld model 957. Computer Forensics: Hacking for Cops. Forensic Examination of a RIM (BlackBerry) Wireless Device [PDF] |
|