Inf. Secur. J. A Glob. Perspect.最新文献

筛选
英文 中文
New Trends in Risk Management 风险管理的新趋势
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-03-01 DOI: 10.1201/1086/43302.7.1.19980301/31033.13
C. Hamilton
{"title":"New Trends in Risk Management","authors":"C. Hamilton","doi":"10.1201/1086/43302.7.1.19980301/31033.13","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31033.13","url":null,"abstract":"Abstract Every time an individual crosses a city street, it involves a risk management decision. Is the light green? How fast is the traffic coming? How important is it to get across the intersection quickly? Is there a $1,000 bill laying on the curb? Is the person being chased by a man with a gun? All these considerations are analyzed in a split second and the decision is made: cross the street now, even against the light; or wait until the “walk” sign lights up.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124955232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Computer Crime and Analysis of Computer Evidence: It Ain't Just Hackers and Phreakers Anymore! 计算机犯罪和计算机证据分析:不再只是黑客和传播者了!
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-03-01 DOI: 10.1201/1086/43302.7.1.19980301/31026.6
Karl J. Flusche
{"title":"Computer Crime and Analysis of Computer Evidence: It Ain't Just Hackers and Phreakers Anymore!","authors":"Karl J. Flusche","doi":"10.1201/1086/43302.7.1.19980301/31026.6","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31026.6","url":null,"abstract":"Abstract On June 17, 1993, the state of Virginia executed Andrew J. Charbrol, a former Navy officer, who tracked down, stalked, and murdered Melissa Harrington as revenge for her filing a sexual harassment charge against him, which ended his marriage and his career in the Navy. The electronic journal he kept on his computer was a key piece of evidence used to show how the crime was premeditated. His stalking of her and his plans to murder her were detailed in this journal.1","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130260725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DES Is Dead! Long Live ???? DES已经死了!万岁????
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-03-01 DOI: 10.1201/1086/43302.7.1.19980301/31031.11
Ben Rothke
{"title":"DES Is Dead! Long Live ????","authors":"Ben Rothke","doi":"10.1201/1086/43302.7.1.19980301/31031.11","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31031.11","url":null,"abstract":"Abstract The Data Encryption Standard (DES) is an encryption cipher defined and endorsed by the U.S. government in 1977 as an official federal standard. Details about DES can be found in the FIPS (Federal Information Processing Standards) publication (FIPS 46-2). DES was originally developed at IBM under the auspices of the National Security Agency in what was known as Project Lucifer. DES has been extensively studied since its inception and is both the most well- known and most widely used cryptosystem in the world. DES was intended to provide strong encryption for the government's sensitive but unclassified information.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122495198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web Certification: A Benchmark for Trustworthy Commerce Web认证:可信赖商务的基准
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-03-01 DOI: 10.1201/1086/43302.7.1.19980301/31025.5
B. Wright
{"title":"Web Certification: A Benchmark for Trustworthy Commerce","authors":"B. Wright","doi":"10.1201/1086/43302.7.1.19980301/31025.5","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31025.5","url":null,"abstract":"Abstract One of the great and lasting effects of the Internet revolution is the triumph of the Transmission Control Protocol/Internet Protocol (TCP/IP) and the tools that support it, such as Web brows- ers. Internet technologies have become the common denominator in the networking world and the platform for the leading edge of electronic commerce. Folks yearn to use the public Internet and its offspring, private intranets, to transact business.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126424893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Disclosure via the Internet: Electronic Delivery of Mandated Disclosure Documents 通过互联网披露:强制披露文件的电子交付
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-03-01 DOI: 10.1201/1086/43302.7.1.19980301/31029.9
Sarah Hewitt
{"title":"Disclosure via the Internet: Electronic Delivery of Mandated Disclosure Documents","authors":"Sarah Hewitt","doi":"10.1201/1086/43302.7.1.19980301/31029.9","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31029.9","url":null,"abstract":"Abstract This article is directed to public companies that want to use the Internet for disclosure purposes. Because electronic media — including Internet Web sites — potentially allow for the rapid dissemination of information to investors and financial markets in a more cost-effective and widespread manner than traditional “paper-based methods,” issuers and other market participants have been requesting guidance from the Securities and Exchange Commission (SEC) on how to deliver mandated disclosure documents (e.g., annual reports and proxy statements) via electronic media in compliance with existing federal securities laws. The SEC has yet to promulgate a comprehensive set of rules and regulations to govern the electronic delivery of documents to the public. However, in an effort to respond to inquiries and to offer guidance to issuers (including corporations and mutual funds) and other market participants (including broker/dealers) with respect to the electronic delivery of man- dated disclosure docume...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"69 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extranet Security: What's Right for the Business? 外联网安全:什么对企业是正确的?
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-03-01 DOI: 10.1201/1086/43302.7.1.19980301/31030.10
Steve Trolan
{"title":"Extranet Security: What's Right for the Business?","authors":"Steve Trolan","doi":"10.1201/1086/43302.7.1.19980301/31030.10","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31030.10","url":null,"abstract":"Abstract Before traveling too far down the path of presenting secure extra- net architectures, it is helpful to get a solid foundation of what an extranet actually is. In and of itself, this discussion could provide sufficient material for a dissertation; however, to keep it brief, any omission of an opinion is clearly intentional.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122712822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Lowly Password 低级密码
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-03-01 DOI: 10.1201/1086/43302.7.1.19980301/31023.3
R. Poore
{"title":"The Lowly Password","authors":"R. Poore","doi":"10.1201/1086/43302.7.1.19980301/31023.3","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31023.3","url":null,"abstract":"Abstract The password has long served as the traditional authenticator for system access. As the least expensive authentication method — one usually provided by vendors as a standard “feature” of their system — the much used password remains little understood in terms of its effectiveness. Here I describe a methodical approach to understanding passwords and their effectiveness. At some point in the future, perhaps biometric authentication will become the norm and we will no longer rely on passwords. Until that time, security administrators and computer auditors need to understand and properly implement password-based security schemes.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126823134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Tale of Two Spies: The Outside Hacker and the Trusted Insider 两个间谍的故事:外部黑客和可信赖的内部人员
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-03-01 DOI: 10.1201/1086/43302.7.1.19980301/31028.8
Karl J. Flusche
{"title":"A Tale of Two Spies: The Outside Hacker and the Trusted Insider","authors":"Karl J. Flusche","doi":"10.1201/1086/43302.7.1.19980301/31028.8","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31028.8","url":null,"abstract":"Abstract From 1986 to 1988, several computer hackers located in Hannover, Germany worked their way into more than 40 computer systems here in the United States, mostly military and federal government research-related systems. They downloaded hundreds of files consisting of thousands of pages of material, looking for military secrets pertaining to the latest weapons and other defense systems. They sold these printouts to a Soviet KGB agent in East Berlin. Although they managed to penetrate scores of computers during this two-year period, not one page of the material they stole was classified. Sensitive information, yes, but all of it publicly available. In February 1989, a young 22-year-old U.S. soldier, Michael A. Peri, abruptly left his unit in Fulda, Germany and calmly climbed the barbed-wire fence separating East and West Germany. In his black duffel bag was a laptop computer he had stolen from his unit, along with several floppy disks. Two of the disks contained hundreds of pages of classified U.S. se...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122303980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unlocking the Secrets of Computer Evidence: What Would Happen if I Pressed This Key? 解锁计算机证据的秘密:如果我按下这个键会发生什么?
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-03-01 DOI: 10.1201/1086/43302.7.1.19980301/31027.7
Karl J. Flusche
{"title":"Unlocking the Secrets of Computer Evidence: What Would Happen if I Pressed This Key?","authors":"Karl J. Flusche","doi":"10.1201/1086/43302.7.1.19980301/31027.7","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31027.7","url":null,"abstract":"Abstract When seizing computer evidence, the investigator or crime scene processor must exercise great care to preserve not only the integrity of the evidence but also the value of the information. Mishandled computer evidence can result in lost data that could have aided the resolution of the crime. In addition, if the computer was seized from a legitimate business, and data files or programs belonging to the company were lost, destroyed, or compromised, the investigative agency could face liability charges.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"551 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128050055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Electronic Commerce Security on the Internet 互联网上的电子商务安全
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-03-01 DOI: 10.1201/1086/43302.7.1.19980301/31032.12
Dennis A. Dallas
{"title":"Electronic Commerce Security on the Internet","authors":"Dennis A. Dallas","doi":"10.1201/1086/43302.7.1.19980301/31032.12","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31032.12","url":null,"abstract":"Abstract Electronic commerce within the Internet is mainly using a combination of the World Wide Web and electronic mail (E-mail). On occasion, File Transport Protocol (FTP) as well as facsimile (fax), and electronic data interchange (EDI) are used.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114375589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信