{"title":"Secure Access to Mission-Critical Applications","authors":"David Johnson","doi":"10.1201/1086/43304.8.1.19990301/31054.10","DOIUrl":"https://doi.org/10.1201/1086/43304.8.1.19990301/31054.10","url":null,"abstract":"Abstract Every day, MIS departments in organizations around the world wonder how they can maximize the potential of the Internet. One of the biggest obstacles still holding them back is their concern over security. Organizations face new challenges when attempting to interface legacy systems with the Web. Whether it is an internal intranet or external access for employees or business partners over the Internet, a series of security measures and policies can be put in place to ensure secure access to these mission-critical applications. This article will look at several levels of security that companies should address to help alleviate concerns over utilizing the Internet for business-critical activities. Areas to address include network integrity, authentication services, communication integrity, and protection of the information flowing across the network.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125025274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Strategy for Ethical Management of E-mail Privacy","authors":"J. Sipior, Burke T. Ward, Sebastian M. Rainone","doi":"10.1201/1086/43304.8.1.19990301/31055.11","DOIUrl":"https://doi.org/10.1201/1086/43304.8.1.19990301/31055.11","url":null,"abstract":"Abstract E-mail enhances communication and information access. The benefits organizations stand to gain, however, cannot be realized without a full consideration of the associated costs and responsibilities.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133964754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public Key Infrastructure for Messaging Security","authors":"Philip Carden","doi":"10.1201/1086/43304.8.1.19990301/31050.6","DOIUrl":"https://doi.org/10.1201/1086/43304.8.1.19990301/31050.6","url":null,"abstract":"Abstract Changes in IT infrastructure enable new classes of applications to exist. For example, the proliferation of the personal computer in the 1980s enabled office automation applications to gain critical mass, while deployment of TCP/IP in the early 1990s set the stage for client/server deployment and the widespread use of Web technologies. Simply put, infrastructure enables applications. The next major wave of applications will revolve around electronic commerce, which relies on a number of infrastructure technologies, not the least of which are TCP/IP and Web technologies. However, there is one key enabling technology for these applications which is not yet sufficiently deployed — public key encryption.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123902708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas?","authors":"M. Whitman, A. Townsend, Robert J. Aalberts","doi":"10.1201/1086/43304.8.1.19990301/31047.3","DOIUrl":"https://doi.org/10.1201/1086/43304.8.1.19990301/31047.3","url":null,"abstract":"Abstract In the realm of domain name services, close doesn't count. As electronic commerce grows in importance, an increasing number of established companies scramble to create an Internet presence. However, although most companies have carefully registered their company names, name brands, and trademarks, many have been surprised to find a “cybersquatter” already owns the URL (uniform resource locator) that customers would naturally associate with the firm. Probably the most outrageous example of the problem is demonstrated by the now-famous www.whitehouse.com incident. While savvy Web users know that “.gov” is the domain for government Web sites, hundreds of thousands of users have been surprised to find a pornographic Web site where they expected information on the presidency, especially those using the reference from a very popular introductory information systems textbook. Oddly enough, the owners of whitehouse.com are not cybersquatters in the absolute sense, but are only pranksters with an odd sens...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127930742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated Approach to Security on Demand in ATM Networks","authors":"H. J. Schumacher, Sumit Ghosh","doi":"10.1080/10658989809342545","DOIUrl":"https://doi.org/10.1080/10658989809342545","url":null,"abstract":"This article Introduces a conceptual framework for network security that provides a basis to address, fundamentally, every weakness In a given network. The principal objective of the frame work Is to provide a basis to determine the resulting security of a composite network that Is formed from connecting two or more networks with known security. Using asynchronous transfer mode (ATM), this framework can facilitate electronic commerce by devising fixed routing across networks of known security.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128166217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Top 10 Dial-In Security Mistakes","authors":"Heather Smartt","doi":"10.1201/1086/43300.7.3.19980901/31001.2","DOIUrl":"https://doi.org/10.1201/1086/43300.7.3.19980901/31001.2","url":null,"abstract":"Abstract A constant barrage of information about hackers bombards companies. There are hundreds, if not thousands of books about computer security, network security, and operating system security. There are a number of security products on the market — some keep people out, some keep people in, some track people down. All of the Big Five accounting firms and many small, boutique firms are offering security consulting services. It is fair to say that computer security is a hot topic in society.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123924881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review of: \"Computer Encryptions in Whispering Caves by D. Larry Crumbley, L. Murphy Smith, and Edith Battles, published by Dame Publications, Inc., 1998\"","authors":"R. Poore","doi":"10.1201/1086/43300.7.3.19980901/31005.6","DOIUrl":"https://doi.org/10.1201/1086/43300.7.3.19980901/31005.6","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129203362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Security, Business, and the Internet","authors":"C. Blatchford","doi":"10.1201/1086/43300.7.3.19980901/31008.9","DOIUrl":"https://doi.org/10.1201/1086/43300.7.3.19980901/31008.9","url":null,"abstract":"Abstract This is the beginning of the age of the Global Networked Economy. Benefits will come with the network as the market, and the network as the channel for the market. Society increasingly is excited by the resulting opportunities. Economists have recognized the possible start of the next Long- wave of economic growth — the 5th Kondratieff Cycle, named after a Russian academician of the early 20th Century. The stock market investor sees a major shift in business opportunities and future corporate profitability driven by the exploitation of IT/Telecommunication services. The stock market levels reached daily in the United States and Europe during the Spring of 1998 highlight this expectation.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"112 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116189896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Sniffer Attacks","authors":"William H. Creech","doi":"10.1201/1086/43300.7.3.19980901/31006.7","DOIUrl":"https://doi.org/10.1201/1086/43300.7.3.19980901/31006.7","url":null,"abstract":"Abstract One of the author's clients dismissed the possibility of a network sniffer attack. He said, “Network sniffers are not a concern. They cost $20,000 or more, so hackers cannot afford one.” He was wrong because there are many network sniffers that cost much less than $20,000. For example, there are free or almost free sniffers for the IBM PC with MS-DOS. Plus there are many sniff- ers for Windows 95, Windows NT, UNIX, and even hand-held computers. These sniffers are powerful and can capture user IDs and passwords or possibly confidential data from a network.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic Commerce Security","authors":"David Cullinane","doi":"10.1201/1086/43300.7.3.19980901/31009.10","DOIUrl":"https://doi.org/10.1201/1086/43300.7.3.19980901/31009.10","url":null,"abstract":"Abstract Current estimates indicate that there will be 500 million users connected to the Internet by 2001. If only ten percent of those users are potentially malicious, there are approximately 50 million threats to information assets connected to the network that an organization plans to use to conduct business. If only one percent of those users represent truly significant threats to an organization, there are 5 million potential intruders that can reach the virtual front door. If only one-half of one percent (0.5 percent) are criminals (a conservative estimate in most demographic groups), there are 2.5 million potential thieves who can try to steal things of value from an organization simply by turning on their PC.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134283145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}