Call for papers
SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: firstname.lastname@example.org
Wireless Policy Development (Part Two)
This is the second of a two-part series that will help create a framework for the most important aspect of any wireless security strategy -- policy development.
Wireless Policy Development (Part One)
This is the first of a two-part series that will help create a framework for the most important aspect of any wireless security strategy -- policy development.
Pocket-Sized Wireless Detection
This article provides a comparison of two tiny 802.11 detectors and discusses how they would fit into your overall WiFi security framework.
Basic IIS Lockdown Using Scripts and Group Policy
This paper is written for system administrators who want to make their life managing IIS easier using scripts with Active Directory and Group Policy.
U.S. Information Security Law, Part Four
This is the last article in a four-part series looking at U.S. information security laws and the way those laws affect the work of security professionals. This installment continues the discussion of information security in the public sector and provides an overview of national security law in the United States as it pertains to information security.
Conducting a Security Audit: An Introductory Overview
This article will offer a brief overview of security audits: what they are, why they are important, and how they are conducted.
U.S. Information Security Law, Part 3
This is the third part of a four-part series looking at U.S. information security laws and the way those laws affect security professionals. In this installment, we will look at the basics of the criminal information security law.
Steganography is a means of protecting the confidentiality of data by "hiding" it within a larger file of data. This technique can be used for both legitimate and illegitimate purposes. This article will offer a brief introductory discussion of steganography: what it is, how it can be used, and the implications it can have for security.
U.S. Information Security Law, Part 2
This is the second part of a four-part series looking at U.S. information security laws and the way those laws affect security professionals. In this installment, we will look at the legal framework for security of an enterprise's working environment from the perspective of information security professionals, with particular emphasis on the protection of communications.
Virus Hoaxes and the Real Dangers They Pose
Virus Hoaxes are a fairly common phenomenon. Most email users have received messages warning of malicious viruses threatening to wreak havoc on their computers. Many of these hoaxes are harmless fun. Unfortunately, many pose real dangers. This article will offer a brief overview of virus hoaxes, how users can spot them, and how they can protect themselves against them.