{"title":"Professional Certification - What's the Point?","authors":"Harold F. Tipton","doi":"10.1201/1086/43302.7.1.19980301/31022.2","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31022.2","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"149 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115585002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network and Internet Security","authors":"S. Bellovin","doi":"10.1080/10658989709342539","DOIUrl":"https://doi.org/10.1080/10658989709342539","url":null,"abstract":"It sounds good when knowing the network and internet security in this website. This is one of the books that many people looking for. In the past, many people ask about this book as their favourite book to read and collect. And now, we present hat you need quickly. It seems to be so happy to offer you this famous book. It will not become a unity of the way for you to get amazing benefits at all. But, it will serve something that will let you get the best time and moment to spend for reading the book.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122768254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facing the Challenge of Vital Records Recovery","authors":"Cole Emerson","doi":"10.1080/19393559308551350","DOIUrl":"https://doi.org/10.1080/19393559308551350","url":null,"abstract":"For most of us who have moved up to senior management positions, our heads ache whenever we have to get back into the bits and bytes of our work. Unfortunately, no effective records management program was ever developed without digging deeply into the details of how information is used within the organization, and this can require a tremendous amount of patience and hard work. It is no wonder that senior management's eyes roll up and ears shut when we bring up such issues as records management and vital records identification. Sadly, aversion to these issues is common among most of us; recovery of vital records always seems to be the last component developed in the business recovery process. Records management is not a technically elegant area of interest; problems cannot be quickly resolved by some simple piece of hardware or software.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126767693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Invisible Connections","authors":"R. Poore","doi":"10.1080/10658989709342531","DOIUrl":"https://doi.org/10.1080/10658989709342531","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122290560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information warfare and the information systems security professional","authors":"Gerald L. Kovacich","doi":"10.1080/10658989709342535","DOIUrl":"https://doi.org/10.1080/10658989709342535","url":null,"abstract":"The ‘Cold War’ has ended, but it has been replaced by new ‘wars’. These wars involve the use of technology as a tool to assist in conducting information warfare. It encompasses electronic warfare, techno-terrorist activities and even economic espionage. The term information warfare (IW) is being talked about as the 21st century method of waging war. The United States, among other countries, is in the process of developing ‘cyberspace weapons’. According to the June 22, 1995 issue of a United States magazine, Washington Technology, “. . . The cyberspace war plans dubbed information warfare by the Pentagon are intended to manipulate the flow of information to enemy leaders, weapons and citizens...“.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122511760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Fight for International Security Solutions","authors":"C. Blatchford","doi":"10.1080/19393559308551363","DOIUrl":"https://doi.org/10.1080/19393559308551363","url":null,"abstract":"In the new world order, the boundary between national and corporate objectives could become indistinct. Resources aligned as part of the Cold War could be refocused for perverse commercial advantage. One possibility is the shifting of intelligence-gathering capabilities of individual nation states so that they are more overtly targeted at the international corporate environment. Some consider this just a “profitable” adjunct to normal market forces (as in a multinational corporation buying time in the competitive marketplace from an enterprise offering services on a spy satellite). In the extreme, however, it could result in a closer coupling of the national intelligence services to specific, preferred and friendly capitalist enterprises. Moves to align national and corporate security objectives may have already emerged as national authorities agonize over the imbalances in the trade of manufactured goods between the various players.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122841764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Telephony Security","authors":"W. Yarberry","doi":"10.1201/1086/43304.8.1.19990301/31056.12","DOIUrl":"https://doi.org/10.1201/1086/43304.8.1.19990301/31056.12","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122952307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Top Secret Traffic and the Public ATM Network Infrastructure","authors":"H. J. Schumacher, Sumit Ghosh, Tony S. Lee","doi":"10.1201/1086/43301.7.4.19990101/31018.7","DOIUrl":"https://doi.org/10.1201/1086/43301.7.4.19990101/31018.7","url":null,"abstract":"Abstract The current network security paradigm, coupled with the desire to transport classified traffic securely, has caused the U.S. Department of Defense (DoD) to maintain its own isolated networks, distinct from the public ATM network infrastructure. Internally, the DoD maintains four types of completely separate and isolated networks to carry top secret, secret, confidential, and unclassified traffic, respectively. A public ATM network may be viewed as carrying unclassified or nonsecure traffic. Although the cost of maintaining four separate network types is becoming increasingly prohibitive to the DoD, the inability of the public and DoD to utilize each other's network resources runs counter to the current atmosphere of dual use and economies of scale. This article introduces the concept of a “mixed use” network, wherein the four DoD network types and the public ATM network are coalesced into a single, unified network that transports all four types of traffic, efficiently and without compromising the...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123480351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Twelve Months to Go - and Counting","authors":"Jeffrey L. Ott","doi":"10.1201/1086/43301.7.4.19990101/31012.1","DOIUrl":"https://doi.org/10.1201/1086/43301.7.4.19990101/31012.1","url":null,"abstract":"Abstract In twelve months, the world's computers will hit a technological wall. Some will survive without even noticing the transition. Others will hit so hard, we will feel the impact while sitting in the comfort of our homes. We will know that it is not Dick Clark's New Year's Celebration we feel, but the crashing and burning of countless computers. We in the information technology profession are probably more aware of the underlying issues than the average person but, in the long run, I do not think that really helps.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125470193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Situational Approach to Integrity","authors":"Harry B. DeMaio","doi":"10.1080/19393559308551359","DOIUrl":"https://doi.org/10.1080/19393559308551359","url":null,"abstract":"Orthodoxy can be both beneficial and destructive. Without a certain amount of orthodoxy in defining security practices and terminology, for example, it would be impossible to develop useful standards. However, orthodoxy should never be an end in itself. Security professionals should be judged according to the effectiveness of their recommendations and actions, not by the number of individuals that quote from their catechism. And yet despite the valuable efforts of a number of professional associations and practitioners to develop a common body of knowledge for information security, I believe that we are inexorably moving toward a world in which circumstances are almost as important as standards and definitions. Such an existential approach to security does not imply an intellectual free-for-all; it means being pragmatic, responsive to individual situations, but in a disciplined and internally consistent manner.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121964344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}