|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
Who Goes There? An Introduction to On-Access Virus Scanning, Part OneBy now, most savvy computer users have anti-virus software (AV) installed on their machines and use it as part of their regular computing routine. However, most average users do not know how anti-virus software works. This two-part series will offer a brief overview of a particular type of anti-virus mechanism know as on-access virus scanners. 2002-09-03 http://www.securityfocus.com/infocus/1622
Introduction to Autorooters: Crackers Working Smarter, not HarderThis article will offer a brief overview of autorooters, programs designed to automatically scan and attack computers and networks at great speeds. Autorooters are becoming an increasing security concern because they require little skill to deploy and can target large numbers of systems at one time. 2002-08-21 http://www.securityfocus.com/infocus/1619
Unlocking the Secrets of CryptoThe terms encryption, cryptography and cryptology - commonly grouped together under the term "crypto" - are seeping into our daily language. Still, many people are unsure of what these terms refer to. The purpose of this article is to demystify crypto and break it down to simple tools that aid us in achieving satisfactory privacy and security. 2002-08-13 http://www.securityfocus.com/infocus/1617
Assessing Internet Security Risk, Part 3: an Internet Assessment Methodology ContinuedThis article is the third in a series that is designed to help readers to assess the risk that their Internet-connected systems are exposed to. In this installment, we will continue to discuss methodology, particularly visibility and vulnerability scanning. 2002-07-30 http://www.securityfocus.com/infocus/1612
Assessing Internet Security Risk, Part 2: an Internet Assessment MethodologyThis article is the second in a series that is designed to help readers to assess the risk that their Internet-connected systems are exposed to. In the first installment, we established the reasons for doing a technical risk assessment. In this installment, we'll start discussing the methodology that we follow in performing this kind of assessment. 2002-07-16 http://www.securityfocus.com/infocus/1607
Security Concerns in Licensing Agreements, Part One: Clickwrap and Shrinkwrap AgreementsThis is the first of two articles that will discuss some security issues surrounding software licenses and agreements for Web-based information services. This article will discuss why security professionals need to be particularly aware of some issues that these licensing agreements present. 2002-07-04 http://www.securityfocus.com/infocus/1602
Assessing Internet Security Risk, Part 1: What is Risk Assessment?This article is the first of a series that is designed to help readers to assess the risk that their Internet-connected systems are exposed to. What are the threats that Internet-connected systems face and what are the chances of those threats being realized. Answering these questions is the first step in implementing cost-effective security that is appropriate to the level of risk. 2002-06-11 http://www.securityfocus.com/infocus/1591
Securing Privacy Part 4: Internet IssuesThis is the fourth and final installment in a series devoted to protecting users' privacy on the Internet. In this article, we will look more generally at our usage of the Internet. The Internet offers all of us unparalleled access to information, but it also brings with it unique threats to our privacy. This article will examine some of the ways you can protect yourself. 2002-05-29 http://www.securityfocus.com/infocus/1585
Securing Privacy Part 3: E-mail IssuesThis is the third article in a four-part series that will examine privacy concerns as they relate to security. The first installment in the series examined hardware-based privacy issues. The second part discussed software-based issues. This article will discuss privacy issues that are particularly relevant to e-mail. 2002-05-14 http://www.securityfocus.com/infocus/1579
Securing Privacy Part 2: Software IssuesThis is the second article in a three-part series that will examine privacy concerns as they relate to security. This installment will discuss software-based issues and solutions. As we shall see, some software is designed to safeguard privacy, while other software seems designed to compromise it. 2002-04-25 http://www.securityfocus.com/infocus/1573 |
|
Privacy Statement |