{"title":"New Trends in Risk Management","authors":"C. Hamilton","doi":"10.1201/1086/43302.7.1.19980301/31033.13","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31033.13","url":null,"abstract":"Abstract Every time an individual crosses a city street, it involves a risk management decision. Is the light green? How fast is the traffic coming? How important is it to get across the intersection quickly? Is there a $1,000 bill laying on the curb? Is the person being chased by a man with a gun? All these considerations are analyzed in a split second and the decision is made: cross the street now, even against the light; or wait until the “walk” sign lights up.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124955232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Crime and Analysis of Computer Evidence: It Ain't Just Hackers and Phreakers Anymore!","authors":"Karl J. Flusche","doi":"10.1201/1086/43302.7.1.19980301/31026.6","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31026.6","url":null,"abstract":"Abstract On June 17, 1993, the state of Virginia executed Andrew J. Charbrol, a former Navy officer, who tracked down, stalked, and murdered Melissa Harrington as revenge for her filing a sexual harassment charge against him, which ended his marriage and his career in the Navy. The electronic journal he kept on his computer was a key piece of evidence used to show how the crime was premeditated. His stalking of her and his plans to murder her were detailed in this journal.1","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130260725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DES Is Dead! Long Live ????","authors":"Ben Rothke","doi":"10.1201/1086/43302.7.1.19980301/31031.11","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31031.11","url":null,"abstract":"Abstract The Data Encryption Standard (DES) is an encryption cipher defined and endorsed by the U.S. government in 1977 as an official federal standard. Details about DES can be found in the FIPS (Federal Information Processing Standards) publication (FIPS 46-2). DES was originally developed at IBM under the auspices of the National Security Agency in what was known as Project Lucifer. DES has been extensively studied since its inception and is both the most well- known and most widely used cryptosystem in the world. DES was intended to provide strong encryption for the government's sensitive but unclassified information.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122495198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Certification: A Benchmark for Trustworthy Commerce","authors":"B. Wright","doi":"10.1201/1086/43302.7.1.19980301/31025.5","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31025.5","url":null,"abstract":"Abstract One of the great and lasting effects of the Internet revolution is the triumph of the Transmission Control Protocol/Internet Protocol (TCP/IP) and the tools that support it, such as Web brows- ers. Internet technologies have become the common denominator in the networking world and the platform for the leading edge of electronic commerce. Folks yearn to use the public Internet and its offspring, private intranets, to transact business.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126424893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disclosure via the Internet: Electronic Delivery of Mandated Disclosure Documents","authors":"Sarah Hewitt","doi":"10.1201/1086/43302.7.1.19980301/31029.9","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31029.9","url":null,"abstract":"Abstract This article is directed to public companies that want to use the Internet for disclosure purposes. Because electronic media — including Internet Web sites — potentially allow for the rapid dissemination of information to investors and financial markets in a more cost-effective and widespread manner than traditional “paper-based methods,” issuers and other market participants have been requesting guidance from the Securities and Exchange Commission (SEC) on how to deliver mandated disclosure documents (e.g., annual reports and proxy statements) via electronic media in compliance with existing federal securities laws. The SEC has yet to promulgate a comprehensive set of rules and regulations to govern the electronic delivery of documents to the public. However, in an effort to respond to inquiries and to offer guidance to issuers (including corporations and mutual funds) and other market participants (including broker/dealers) with respect to the electronic delivery of man- dated disclosure docume...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"69 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extranet Security: What's Right for the Business?","authors":"Steve Trolan","doi":"10.1201/1086/43302.7.1.19980301/31030.10","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31030.10","url":null,"abstract":"Abstract Before traveling too far down the path of presenting secure extra- net architectures, it is helpful to get a solid foundation of what an extranet actually is. In and of itself, this discussion could provide sufficient material for a dissertation; however, to keep it brief, any omission of an opinion is clearly intentional.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122712822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Lowly Password","authors":"R. Poore","doi":"10.1201/1086/43302.7.1.19980301/31023.3","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31023.3","url":null,"abstract":"Abstract The password has long served as the traditional authenticator for system access. As the least expensive authentication method — one usually provided by vendors as a standard “feature” of their system — the much used password remains little understood in terms of its effectiveness. Here I describe a methodical approach to understanding passwords and their effectiveness. At some point in the future, perhaps biometric authentication will become the norm and we will no longer rely on passwords. Until that time, security administrators and computer auditors need to understand and properly implement password-based security schemes.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126823134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Tale of Two Spies: The Outside Hacker and the Trusted Insider","authors":"Karl J. Flusche","doi":"10.1201/1086/43302.7.1.19980301/31028.8","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31028.8","url":null,"abstract":"Abstract From 1986 to 1988, several computer hackers located in Hannover, Germany worked their way into more than 40 computer systems here in the United States, mostly military and federal government research-related systems. They downloaded hundreds of files consisting of thousands of pages of material, looking for military secrets pertaining to the latest weapons and other defense systems. They sold these printouts to a Soviet KGB agent in East Berlin. Although they managed to penetrate scores of computers during this two-year period, not one page of the material they stole was classified. Sensitive information, yes, but all of it publicly available. In February 1989, a young 22-year-old U.S. soldier, Michael A. Peri, abruptly left his unit in Fulda, Germany and calmly climbed the barbed-wire fence separating East and West Germany. In his black duffel bag was a laptop computer he had stolen from his unit, along with several floppy disks. Two of the disks contained hundreds of pages of classified U.S. se...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122303980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unlocking the Secrets of Computer Evidence: What Would Happen if I Pressed This Key?","authors":"Karl J. Flusche","doi":"10.1201/1086/43302.7.1.19980301/31027.7","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31027.7","url":null,"abstract":"Abstract When seizing computer evidence, the investigator or crime scene processor must exercise great care to preserve not only the integrity of the evidence but also the value of the information. Mishandled computer evidence can result in lost data that could have aided the resolution of the crime. In addition, if the computer was seized from a legitimate business, and data files or programs belonging to the company were lost, destroyed, or compromised, the investigative agency could face liability charges.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"551 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128050055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic Commerce Security on the Internet","authors":"Dennis A. Dallas","doi":"10.1201/1086/43302.7.1.19980301/31032.12","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31032.12","url":null,"abstract":"Abstract Electronic commerce within the Internet is mainly using a combination of the World Wide Web and electronic mail (E-mail). On occasion, File Transport Protocol (FTP) as well as facsimile (fax), and electronic data interchange (EDI) are used.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114375589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}