INFORMATION

Site Map - Cybersecurity

What Are Your Weaknesses?

- The first step that a company can and should take along the road to better data security is to conduct a formal IT assessment.

P2P Dangers Growing

- More than doubling in three years, P2P use is an increasingly dangerous means of sending confidential information.

Tech Talk From Microsoft — How to Use the TechNet Security Center

- This is the first in a series of four pieces that will highlight resources available from Microsoft. ASIS International is partnering with Microsoft to help raise IT awareness among its security professional membership.

Essential Computer Security

- The Essential Computer Security: Everyone’s Guide to Email, Internet, and Wireless Security can serve as the owner’s manual for anyone serious about ensuring the security of their computer and the data contained therein.

Behind the Numbers: Image Spam Fades in 2007

-

Paying Up for Retail Privacy

- A study in which participants were given money to spend online found that they would pay more at a site with better privacy.

Numbers

- Cyberthreats detected last year that were Trojan horse programs.

Worth a Look: Traveling With Encryption

- The EncryptEase “intelligent” disk is both a CD-ROM and a CD-R, meaning that it offers both an unwritable, protected space where the encryption software is contained, as well as storage space that can be written over many times, where encrypted data is held.

Exterminating Online Pests

- Protect Your Computers from Malicious Internet Invaders, a new book from Preston Gralla, shows how to trap these invaders in a protective web that keeps your computer running smoothly and your personal information safe.

When Cybercriminals Turn Pro

- Cole and his team wanted to examine the changing nature of hackers and malicious-code writers, and the communities in which they work. As a basis for their research, the Symantec team looked specifically at an increasingly widespread Trojan horse program called Bancos that targets customers of some Latin American banks and tries to steal their account passwords.

Quick Bytes: WAN worries.

- The Department of Homeland Security (DHS) lacks the automated network security tools that would help identify the cause of messages received from automated security devices, says a report by the DHS Office of the Inspector General (OIG). That’s no small problem: the report shows that from February to April 2005, more than 65 million security events were logged, and without automated tools in place, it is impossible for administrators to separate the real threats from the false alarms. @ The OIG’s report, management of the DHS Wide Area Network Needs Improvement, is available at SM Online.

A Site To See

- As the number of Internet-based threats grows, it becomes more and more difficult to assign a single name to malicious code. Spyware, malware, crimeware what word can be used to describe a whole galaxy of threats? A new Web site established by experts at several top universities and sponsored by high-tech companies like Google and Sun Microsystems offers a suggestion: badware. The site, stopbadware.org, was created by the Berkman Center for Internet & Society at Harvard University, the Oxford Internet Institute, and Consumer Reports WebWatch.The sheer size of the badware problem makes this site particularly timely and useful, and thus A Site to See this month.

Worth a Look: Traveling With Encryption

- Travelers looking to take sensitive documents with them on the road can burn that data to a CD while simultaneously encrypting it using a new product from Ricoh called EncryptEase. Then, they can decrypt those documents using any computer that has an attached CD writer, add to or alter the data, and then burn it back to the same CD while reencrypting it. The twist is, the encryption software and the space for burning the files are on the same disk. Where to get one. Balancing these reservations is the fact that the disks are cheap; they retail for $6.99 each at Ricohs Web site. Get there via "Beyond Print" links at SM Online.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.