Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Foundations (Page 9 of 11)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Anonymizing with Squid Proxy
By: Anton Chuvakin 2001-09-20
http://www.securityfocus.com/infocus/1508

Basic Security Checklist for Home and Office Users
This article will offer readers a simple basic security checklist that will enable users and managers to increase the security level in their organization without any additional financial investment. It is axiomatic in computer security that the weakest link in the security chain is user error. Since the measures listed in this article are aimed at promoting secure user behavior, they are extremely effective in lowering the risk of a security breach.
By: Anton Chuvakin 2001-11-05
http://www.securityfocus.com/infocus/1504

Introduction to Security Policies, Part Four: A Sample Policy
This is the fourth in a four-part overview of security policies. In the first article, we looked at what policies are and what they can achieve. The second article looked at the organizational support required to implement security policies successfully. The third installment discussed how to develop and structure a security policy. This installment will take a look at a few examples of security policies.
By: Charl van der Walt 2001-10-22
http://www.securityfocus.com/infocus/1497

Introduction to Security Policies, Part Three: Structuring Security Policies
This is the third in a four-part overview of security policies. In the first article, we looked at what policies are and what they can achieve. In the second article, we looked at the organizational support required to implement security policies successfully. In this installment, we shall discuss how to develop and structure a security policy.
By: Charl van der Walt 2001-10-09
http://www.securityfocus.com/infocus/1487

Introduction to Security Policies, Part Two: Creating a Supportive Environment
This is the second in a four-part series discussing security policies. The first part offered a brief introduction to policies and their function within organizations. This article will go over a few of things that can be done to ensure that security policies are given the full support of the management of the organization, which will thereby increase the efficacy of the policies.
By: Charl van der Walt 2001-09-24
http://www.securityfocus.com/infocus/1473

Virtual Private Networks: A Broken Dream?
Virtual Private Networks allow organizations to establish secure links with business partners and extend communications to regional and isolated offices. In doing so, they significantly diminish the cost of communications for an increasingly mobile workforce. While VPNs are gaining widespread acceptance as security solutions, they are not a panacea. This article will serve as a brief introduction to VPN technology. It will also illustrate some vulnerabilities that have been discovered in VPNs.
By: Eric Hines 2001-09-10
http://www.securityfocus.com/infocus/1461

How To Use This Site
By: Ben Greenbaum 2000-11-06
http://www.securityfocus.com/infocus/1434

What is SecurityFocus
By: Ben Greenbaum 2000-11-06
http://www.securityfocus.com/infocus/1433

Basic Security Mechanisms for Wireless Networks
As wireless applications become more common, security becomes a more important issue. Unfortunately, due to the ease of wireless deployment, and the freshness of the technology, many people do not realize the risks associated with operating wireless technologies. This article will offer a brief overview of the security concerns involved with wireless networks, including: how and why they are vulnerable to compromise, how they can be protected, and some expected future developments.
By: Joe Klemencic 2001-07-16
http://www.securityfocus.com/infocus/1199

SSL - Rumours and Reality:A practical perspective on the value of SSL for protecting web servers
By: Charl van der Walt 2001-01-24
http://www.securityfocus.com/infocus/1198

Foundations (Page 9 of 11)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus