INFORMATION

Site Map - IT Security

Insights on Internet Investigations

- The National Institute of Justice has issued another in its series of reports on investigating high-tech crimes. It provides guidance on such issues as tracing an Internet address to its source. It also looks at specifics with regard to various issues such as Web site capture tools and Web archiving sites that may help an investigator determine the content of a site at the time the crime was committed. It likewise discusses the unique concerns involved in investigations of instant messenging (IM), chat rooms, and Internet Relay Chat. It notes, for example, "Service providers are not required to retain IP address information. Therefore, when an IM program is involved, time is of the essence." Read the complete report.

Wireless Intrusion Prevention WIPing Into Shape

- Major companies pay increased attention to preventing wireless network intrusion.

A Site to See

- Hak.5 calls itself “a television show for geeks, hackers, and do-it-yourselfers” that is distributed online in short YouTube segments. Find out more about the exploits that are coming your way by visiting Hak.5., this month’s Site to See.

Software Security: Building Security In

- McGraw goes into detail not only about writing secure code but also about key related areas, which he terms “the seven touchpoints of software security.”

Cybersecurity Progress

- The Homeland Security Department is still struggling to fulfill its cybersecurity responsibilities, according to this report from the Government Accountability Office.

A Site to See

- A television show for geeks.

A Healthy Way to Protect Patient Data

- A healthcare organization found that it needed a way to control the use of removable media to ensure that patient data remains protected.

Keys to Encryption

- Encrypting data is no longer an expensive, time-consuming headache. Here’s an overview of some of the different types of encryption products available.

Numbers

- 100 The number, in millions, of records containing personal information reported compromised between February 2005 and December 2006, according to the Privacy Rights Clearinghouse.

Barriers to Better IT Security

- What prevents IT professionals from setting up the best possible security programs?

Cybersecurity

- Get up to code with Web application security standards and learn how to plug up your cybersecurity holes before a hacker attacks here, here, and here.

Malware's Evolving Threat

- An overview of malware assailing your computer.

IT Security

- INS conducted a survey about what prevents IT professionals from setting up the best possible security programs. Get the results.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.