Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Foundations (Page 7 of 11)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Who Goes There? An Introduction to On-Access Virus Scanning, Part One
By now, most savvy computer users have anti-virus software (AV) installed on their machines and use it as part of their regular computing routine. However, most average users do not know how anti-virus software works. This two-part series will offer a brief overview of a particular type of anti-virus mechanism know as on-access virus scanners.
By: Bill Hayes 2002-09-03
http://www.securityfocus.com/infocus/1622

Introduction to Autorooters: Crackers Working Smarter, not Harder
This article will offer a brief overview of autorooters, programs designed to automatically scan and attack computers and networks at great speeds. Autorooters are becoming an increasing security concern because they require little skill to deploy and can target large numbers of systems at one time.
By: Matthew Tanase 2002-08-21
http://www.securityfocus.com/infocus/1619

Unlocking the Secrets of Crypto
The terms encryption, cryptography and cryptology - commonly grouped together under the term "crypto" - are seeping into our daily language. Still, many people are unsure of what these terms refer to. The purpose of this article is to demystify crypto and break it down to simple tools that aid us in achieving satisfactory privacy and security.
By: Sarah Granger 2002-08-13
http://www.securityfocus.com/infocus/1617

Assessing Internet Security Risk, Part 3: an Internet Assessment Methodology Continued
This article is the third in a series that is designed to help readers to assess the risk that their Internet-connected systems are exposed to. In this installment, we will continue to discuss methodology, particularly visibility and vulnerability scanning.
By: Charl van der Walt 2002-07-30
http://www.securityfocus.com/infocus/1612

Assessing Internet Security Risk, Part 2: an Internet Assessment Methodology
This article is the second in a series that is designed to help readers to assess the risk that their Internet-connected systems are exposed to. In the first installment, we established the reasons for doing a technical risk assessment. In this installment, we'll start discussing the methodology that we follow in performing this kind of assessment.
By: Charl van der Walt 2002-07-16
http://www.securityfocus.com/infocus/1607

Security Concerns in Licensing Agreements, Part One: Clickwrap and Shrinkwrap Agreements
This is the first of two articles that will discuss some security issues surrounding software licenses and agreements for Web-based information services. This article will discuss why security professionals need to be particularly aware of some issues that these licensing agreements present.
By: Steven Robinson 2002-07-04
http://www.securityfocus.com/infocus/1602

Assessing Internet Security Risk, Part 1: What is Risk Assessment?
This article is the first of a series that is designed to help readers to assess the risk that their Internet-connected systems are exposed to. What are the threats that Internet-connected systems face and what are the chances of those threats being realized. Answering these questions is the first step in implementing cost-effective security that is appropriate to the level of risk.
By: Charl van der Walt 2002-06-11
http://www.securityfocus.com/infocus/1591

Securing Privacy Part 4: Internet Issues
This is the fourth and final installment in a series devoted to protecting users' privacy on the Internet. In this article, we will look more generally at our usage of the Internet. The Internet offers all of us unparalleled access to information, but it also brings with it unique threats to our privacy. This article will examine some of the ways you can protect yourself.
By: Scott Granneman 2002-05-29
http://www.securityfocus.com/infocus/1585

Securing Privacy Part 3: E-mail Issues
This is the third article in a four-part series that will examine privacy concerns as they relate to security. The first installment in the series examined hardware-based privacy issues. The second part discussed software-based issues. This article will discuss privacy issues that are particularly relevant to e-mail.
By: Scott Granneman 2002-05-14
http://www.securityfocus.com/infocus/1579

Securing Privacy Part 2: Software Issues
This is the second article in a three-part series that will examine privacy concerns as they relate to security. This installment will discuss software-based issues and solutions. As we shall see, some software is designed to safeguard privacy, while other software seems designed to compromise it.
By: Scott Granneman 2002-04-25
http://www.securityfocus.com/infocus/1573

Foundations (Page 7 of 11)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus