INFORMATION

Site Map - IT Security

Phone forensics

- Now that cell phones have morphed into miniature computers, they contain more information than ever before. In addition to phone numbers and a record of calls made and received, phones can now contain e-mail or text messages, photos, and a host of other data that could be of value when investigating a crime.

Scans and Attacks

- A paper entitled An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack describes the results of an experimental approach to determine the correlation between port scans and attacks.

Spam Canned?

- The FTC has released Effectiveness and Enforcement of the CAN-SPAM Act, which concludes that the law has been effective in slowing down spam.

Defend I.T.: Security by Example

- The authors do, however, assume a basic level of network and security understanding. The case studies show what system and network administrators can do to protect their networks from the most common attacks.

Quick Bytes: I hear you knocking

- Automated port scans, which look for open ports that might be candidates for exploitation, are sometimes likened to a thief rattling doorknobs, looking for one that’s unlocked.

Quick Bytes: Data Breaches

- More than half the retailers that collect information from consumers for promotions and marketing campaigns have assigned responsibility for protecting consumer-specific data to a security-program coordinator

Phone Forensics

- Though the paper is aimed at investigators who already have some of the skills needed to do computer forensic investigations, it includes much information that will be of value to anyone who is interested in how cellular devices work and how they should be properly seized and analyzed.

Trouble on the Line

- Find out how your company can benefit from Internet phone communications, called VoIP, while avoiding the risks

Password Security

- The weakest link in computer network security isn’t technology, it’s users, concludes a new government survey from the United Kingdom. Find out why passwords are key.

IT Security

- Peer-to-peer file-sharing networks pose a severe risk of inadvertent disclosure for large financial institutions, say researchers from the Center for Digital Strategies.

Web Protections

- Consumers will pay more money to shop on a retailer’s Web site with strong privacy protections according to a Carnegie Mellon study.

Quick Bytes: Risky e-mail

- Half of the corporate employees surveyed have saved a work e-mail outside the company network, and almost half have used corporate systems to send jokes, pictures, and “stories of a questionable tone” to friends. Yet 92 percent of these respondents believe that their e-mail use does not pose any risk to their employers.

Web Sites Provide Rich Harvest for Spammers

- If your e-mail address is posted on a Web site, the chances of it being “harvested” by a spammer are much greater than if the address appears on a blog, on a message board, or in a chat room. That’s one finding from a study conducted by the Federal Trade Commission (FTC), whose investigators created 150 e-mail accounts—50 with an Internet service provider (ISP) that does not use antispam filtering, and 50 each at two other ISPs that do filter for spam—to learn more about how to reduce spam. @ E-mail Address Harvesting and the Effectiveness of Anti-SpamFfilters, a report by the federal trade commission’s division of marketing practices, is at SM Online.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.