Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70415-3
Andy Jones
{"title":"The law starts to bite back","authors":"Andy Jones","doi":"10.1016/S1742-6847(06)70415-3","DOIUrl":"10.1016/S1742-6847(06)70415-3","url":null,"abstract":"<div><p>Information security professionals need to start dealing with the law, before the law deals with them.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 41"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70415-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77566378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70405-0
Stefan Krempl
{"title":"Empire and Federation differ in security style","authors":"Stefan Krempl","doi":"10.1016/S1742-6847(06)70405-0","DOIUrl":"10.1016/S1742-6847(06)70405-0","url":null,"abstract":"<div><p>The political histories of Austria and Switzerland show up in their differing approaches to safeguarding their citizens' data and privacy.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 16-18"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70405-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78875006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70414-1
Stuart King
{"title":"A return to traditional methods","authors":"Stuart King","doi":"10.1016/S1742-6847(06)70414-1","DOIUrl":"10.1016/S1742-6847(06)70414-1","url":null,"abstract":"<div><p>Automated test procedures are the lazy, misleading way to test security. Use your loaf too.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 40"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70414-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76067295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70401-3
Ian Grant
{"title":"Australian computer crime changes tack","authors":"Ian Grant","doi":"10.1016/S1742-6847(06)70401-3","DOIUrl":"10.1016/S1742-6847(06)70401-3","url":null,"abstract":"<div><p>Fewer reported attacks and less harm done suggest Australian cybercrime is under control. Big mistake.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70401-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78860359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70409-8
Stephen Pritchard
{"title":"Managing mobile","authors":"Stephen Pritchard","doi":"10.1016/S1742-6847(06)70409-8","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70409-8","url":null,"abstract":"<div><p>Powerful new mobile network access devices threaten to breach corporate information security bulwarks. Here's what to do.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 28-30"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70409-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136496090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70413-X
Ken Munro
{"title":"Lost highway","authors":"Ken Munro","doi":"10.1016/S1742-6847(06)70413-X","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70413-X","url":null,"abstract":"<div><p>Mischief and worse await public and private transport authorities as their kit joins the data highway.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 39"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70413-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136549531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70403-7
Wade Baker
{"title":"The money's at the margins","authors":"Wade Baker","doi":"10.1016/S1742-6847(06)70403-7","DOIUrl":"10.1016/S1742-6847(06)70403-7","url":null,"abstract":"<div><p>It's time information security professionals started using marginal returns to analyse and rank their investments.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 10-11"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70403-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91252803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70411-6
William Knight
{"title":"RFID – another technology, another security mess?","authors":"William Knight","doi":"10.1016/S1742-6847(06)70411-6","DOIUrl":"10.1016/S1742-6847(06)70411-6","url":null,"abstract":"<div><p>It's infinitely useful, has a wide range of applications and is going in at a gallop. But has anybody really thought through the security implications of radio frequency identification (RFID)?</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 35-37"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70411-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91375855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70416-5
Daniel Murton
{"title":"Crypto goes into the bloodstream","authors":"Daniel Murton","doi":"10.1016/S1742-6847(06)70416-5","DOIUrl":"10.1016/S1742-6847(06)70416-5","url":null,"abstract":"<div><p>Cryptography is moving to centre-stage as companies seek to secure their data at rest and in transmission.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 42"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70416-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82454245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}