Inf. Secur. J. A Glob. Perspect.最新文献

筛选
英文 中文
Secure Access to Mission-Critical Applications 安全访问关键任务应用程序
Inf. Secur. J. A Glob. Perspect. Pub Date : 1999-03-01 DOI: 10.1201/1086/43304.8.1.19990301/31054.10
David Johnson
{"title":"Secure Access to Mission-Critical Applications","authors":"David Johnson","doi":"10.1201/1086/43304.8.1.19990301/31054.10","DOIUrl":"https://doi.org/10.1201/1086/43304.8.1.19990301/31054.10","url":null,"abstract":"Abstract Every day, MIS departments in organizations around the world wonder how they can maximize the potential of the Internet. One of the biggest obstacles still holding them back is their concern over security. Organizations face new challenges when attempting to interface legacy systems with the Web. Whether it is an internal intranet or external access for employees or business partners over the Internet, a series of security measures and policies can be put in place to ensure secure access to these mission-critical applications. This article will look at several levels of security that companies should address to help alleviate concerns over utilizing the Internet for business-critical activities. Areas to address include network integrity, authentication services, communication integrity, and protection of the information flowing across the network.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125025274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Strategy for Ethical Management of E-mail Privacy 电子邮件隐私伦理管理策略
Inf. Secur. J. A Glob. Perspect. Pub Date : 1999-03-01 DOI: 10.1201/1086/43304.8.1.19990301/31055.11
J. Sipior, Burke T. Ward, Sebastian M. Rainone
{"title":"A Strategy for Ethical Management of E-mail Privacy","authors":"J. Sipior, Burke T. Ward, Sebastian M. Rainone","doi":"10.1201/1086/43304.8.1.19990301/31055.11","DOIUrl":"https://doi.org/10.1201/1086/43304.8.1.19990301/31055.11","url":null,"abstract":"Abstract E-mail enhances communication and information access. The benefits organizations stand to gain, however, cannot be realized without a full consideration of the associated costs and responsibilities.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133964754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Public Key Infrastructure for Messaging Security 用于消息传递安全的公钥基础设施
Inf. Secur. J. A Glob. Perspect. Pub Date : 1999-03-01 DOI: 10.1201/1086/43304.8.1.19990301/31050.6
Philip Carden
{"title":"Public Key Infrastructure for Messaging Security","authors":"Philip Carden","doi":"10.1201/1086/43304.8.1.19990301/31050.6","DOIUrl":"https://doi.org/10.1201/1086/43304.8.1.19990301/31050.6","url":null,"abstract":"Abstract Changes in IT infrastructure enable new classes of applications to exist. For example, the proliferation of the personal computer in the 1980s enabled office automation applications to gain critical mass, while deployment of TCP/IP in the early 1990s set the stage for client/server deployment and the widespread use of Web technologies. Simply put, infrastructure enables applications. The next major wave of applications will revolve around electronic commerce, which relies on a number of infrastructure technologies, not the least of which are TCP/IP and Web technologies. However, there is one key enabling technology for these applications which is not yet sufficiently deployed — public key encryption.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123902708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas? 域名抢注:先到先得还是网络海洋盗版?
Inf. Secur. J. A Glob. Perspect. Pub Date : 1999-03-01 DOI: 10.1201/1086/43304.8.1.19990301/31047.3
M. Whitman, A. Townsend, Robert J. Aalberts
{"title":"Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas?","authors":"M. Whitman, A. Townsend, Robert J. Aalberts","doi":"10.1201/1086/43304.8.1.19990301/31047.3","DOIUrl":"https://doi.org/10.1201/1086/43304.8.1.19990301/31047.3","url":null,"abstract":"Abstract In the realm of domain name services, close doesn't count. As electronic commerce grows in importance, an increasing number of established companies scramble to create an Internet presence. However, although most companies have carefully registered their company names, name brands, and trademarks, many have been surprised to find a “cybersquatter” already owns the URL (uniform resource locator) that customers would naturally associate with the firm. Probably the most outrageous example of the problem is demonstrated by the now-famous www.whitehouse.com incident. While savvy Web users know that “.gov” is the domain for government Web sites, hundreds of thousands of users have been surprised to find a pornographic Web site where they expected information on the presidency, especially those using the reference from a very popular introductory information systems textbook. Oddly enough, the owners of whitehouse.com are not cybersquatters in the absolute sense, but are only pranksters with an odd sens...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127930742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Integrated Approach to Security on Demand in ATM Networks ATM网络中按需安全的集成方法
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-12-01 DOI: 10.1080/10658989809342545
H. J. Schumacher, Sumit Ghosh
{"title":"An Integrated Approach to Security on Demand in ATM Networks","authors":"H. J. Schumacher, Sumit Ghosh","doi":"10.1080/10658989809342545","DOIUrl":"https://doi.org/10.1080/10658989809342545","url":null,"abstract":"This article Introduces a conceptual framework for network security that provides a basis to address, fundamentally, every weakness In a given network. The principal objective of the frame work Is to provide a basis to determine the resulting security of a composite network that Is formed from connecting two or more networks with known security. Using asynchronous transfer mode (ATM), this framework can facilitate electronic commerce by devising fixed routing across networks of known security.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128166217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Top 10 Dial-In Security Mistakes 十大拨入安全错误
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-09-01 DOI: 10.1201/1086/43300.7.3.19980901/31001.2
Heather Smartt
{"title":"Top 10 Dial-In Security Mistakes","authors":"Heather Smartt","doi":"10.1201/1086/43300.7.3.19980901/31001.2","DOIUrl":"https://doi.org/10.1201/1086/43300.7.3.19980901/31001.2","url":null,"abstract":"Abstract A constant barrage of information about hackers bombards companies. There are hundreds, if not thousands of books about computer security, network security, and operating system security. There are a number of security products on the market — some keep people out, some keep people in, some track people down. All of the Big Five accounting firms and many small, boutique firms are offering security consulting services. It is fair to say that computer security is a hot topic in society.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123924881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review of: "Computer Encryptions in Whispering Caves by D. Larry Crumbley, L. Murphy Smith, and Edith Battles, published by Dame Publications, Inc., 1998" 书评:《窃窃私语洞穴中的计算机加密》,作者:D. Larry Crumbley, L. Murphy Smith和Edith Battles, Dame Publications, Inc., 1998年出版
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-09-01 DOI: 10.1201/1086/43300.7.3.19980901/31005.6
R. Poore
{"title":"A review of: \"Computer Encryptions in Whispering Caves by D. Larry Crumbley, L. Murphy Smith, and Edith Battles, published by Dame Publications, Inc., 1998\"","authors":"R. Poore","doi":"10.1201/1086/43300.7.3.19980901/31005.6","DOIUrl":"https://doi.org/10.1201/1086/43300.7.3.19980901/31005.6","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129203362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security, Business, and the Internet 信息安全,商业和互联网
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-09-01 DOI: 10.1201/1086/43300.7.3.19980901/31008.9
C. Blatchford
{"title":"Information Security, Business, and the Internet","authors":"C. Blatchford","doi":"10.1201/1086/43300.7.3.19980901/31008.9","DOIUrl":"https://doi.org/10.1201/1086/43300.7.3.19980901/31008.9","url":null,"abstract":"Abstract This is the beginning of the age of the Global Networked Economy. Benefits will come with the network as the market, and the network as the channel for the market. Society increasingly is excited by the resulting opportunities. Economists have recognized the possible start of the next Long- wave of economic growth — the 5th Kondratieff Cycle, named after a Russian academician of the early 20th Century. The stock market investor sees a major shift in business opportunities and future corporate profitability driven by the exploitation of IT/Telecommunication services. The stock market levels reached daily in the United States and Europe during the Spring of 1998 highlight this expectation.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"112 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116189896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Sniffer Attacks 网络嗅探攻击
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-09-01 DOI: 10.1201/1086/43300.7.3.19980901/31006.7
William H. Creech
{"title":"Network Sniffer Attacks","authors":"William H. Creech","doi":"10.1201/1086/43300.7.3.19980901/31006.7","DOIUrl":"https://doi.org/10.1201/1086/43300.7.3.19980901/31006.7","url":null,"abstract":"Abstract One of the author's clients dismissed the possibility of a network sniffer attack. He said, “Network sniffers are not a concern. They cost $20,000 or more, so hackers cannot afford one.” He was wrong because there are many network sniffers that cost much less than $20,000. For example, there are free or almost free sniffers for the IBM PC with MS-DOS. Plus there are many sniff- ers for Windows 95, Windows NT, UNIX, and even hand-held computers. These sniffers are powerful and can capture user IDs and passwords or possibly confidential data from a network.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electronic Commerce Security 电子商务保安
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-09-01 DOI: 10.1201/1086/43300.7.3.19980901/31009.10
David Cullinane
{"title":"Electronic Commerce Security","authors":"David Cullinane","doi":"10.1201/1086/43300.7.3.19980901/31009.10","DOIUrl":"https://doi.org/10.1201/1086/43300.7.3.19980901/31009.10","url":null,"abstract":"Abstract Current estimates indicate that there will be 500 million users connected to the Internet by 2001. If only ten percent of those users are potentially malicious, there are approximately 50 million threats to information assets connected to the network that an organization plans to use to conduct business. If only one percent of those users represent truly significant threats to an organization, there are 5 million potential intruders that can reach the virtual front door. If only one-half of one percent (0.5 percent) are criminals (a conservative estimate in most demographic groups), there are 2.5 million potential thieves who can try to steal things of value from an organization simply by turning on their PC.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134283145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信