Call for papers
SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: email@example.com
Anonymizing with Squid Proxy
Basic Security Checklist for Home and Office Users
This article will offer readers a simple basic security checklist that will enable users and managers to increase the security level in their organization without any additional financial investment. It is axiomatic in computer security that the weakest link in the security chain is user error. Since the measures listed in this article are aimed at promoting secure user behavior, they are extremely effective in lowering the risk of a security breach.
Introduction to Security Policies, Part Four: A Sample Policy
This is the fourth in a four-part overview of security policies. In the first article, we looked at what policies are and what they can achieve. The second article looked at the organizational support required to implement security policies successfully. The third installment discussed how to develop and structure a security policy. This installment will take a look at a few examples of security policies.
Introduction to Security Policies, Part Three: Structuring Security Policies
This is the third in a four-part overview of security policies. In the first article, we looked at what policies are and what they can achieve. In the second article, we looked at the organizational support required to implement security policies successfully. In this installment, we shall discuss how to develop and structure a security policy.
Introduction to Security Policies, Part Two: Creating a Supportive Environment
This is the second in a four-part series discussing security policies. The first part offered a brief introduction to policies and their function within organizations. This article will go over a few of things that can be done to ensure that security policies are given the full support of the management of the organization, which will thereby increase the efficacy of the policies.
Virtual Private Networks: A Broken Dream?
Virtual Private Networks allow organizations to establish secure links with business partners and extend communications to regional and isolated offices. In doing so, they significantly diminish the cost of communications for an increasingly mobile workforce. While VPNs are gaining widespread acceptance as security solutions, they are not a panacea. This article will serve as a brief introduction to VPN technology. It will also illustrate some vulnerabilities that have been discovered in VPNs.
How To Use This Site
What is SecurityFocus
Basic Security Mechanisms for Wireless Networks
As wireless applications become more common, security becomes a more important issue. Unfortunately, due to the ease of wireless deployment, and the freshness of the technology, many people do not realize the risks associated with operating wireless technologies. This article will offer a brief overview of the security concerns involved with wireless networks, including: how and why they are vulnerable to compromise, how they can be protected, and some expected future developments.
SSL - Rumours and Reality:A practical perspective on the value of SSL for protecting web servers