INFORMATION

Site Map - IT

Scans and Attacks

- A paper entitled An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack describes the results of an experimental approach to determine the correlation between port scans and attacks.

Spam Canned?

- The FTC has released Effectiveness and Enforcement of the CAN-SPAM Act, which concludes that the law has been effective in slowing down spam.

Defend I.T.: Security by Example

- The authors do, however, assume a basic level of network and security understanding. The case studies show what system and network administrators can do to protect their networks from the most common attacks.

Numbers

- 40 Percentage of companies that suffered a business disruption as a result of poor IT support

Has Spam Been Canned?

- Federal Trade Commission (FTC), which is responsible for analyzing the act’s effectiveness and making recommendations for changes, the act has given the FTC, the Department of Justice, and Internet service providers (ISPs) the ammunition to bring dozens of actions against alleged spammers; many of these legal actions are still in progress, but many others have already resulted in settlements.

Riding the Web 2.0 Wave

- Writely is a Web 2.0 site that offers a word processing program in which multiple collaborators can be given access to particular documents, with changes tracked by time and user. Central Desktop is a collaboration tool that allows teams to work together on project management, allowing members to add documents, Web links, comments, and scheduling information. It offers a variety of communications options, including instant messaging and discussion boards.

Identity Theft

- A bill (S. 495) designed to prevent identity theft has been approved by the Senate Judiciary Committee and will now be taken up by the full Senate.

Internet Privacy

- Want privacy for your Internet searches? Then check out Ixquick, this month’s “Site to See,” the only metasearch engine that deletes the user’s personal data.

Password Security

- The weakest link in computer network security isn’t technology, it’s users, concludes a new government survey from the United Kingdom. Find out why passwords are key.

IT Security

- Peer-to-peer file-sharing networks pose a severe risk of inadvertent disclosure for large financial institutions, say researchers from the Center for Digital Strategies.

Web Protections

- Consumers will pay more money to shop on a retailer’s Web site with strong privacy protections according to a Carnegie Mellon study.

Email Privacy

- E-mail accounts stored by an Internet service provider carry the expectation of privacy, ruled a federal appeals court. The government must obtain a warrant or tell the e-mail account’s owner a subpoena has been issued for that information.

A Site to See

- The next time you see Microsoft Windows’ “blue screen of death” or a “fatal error” message flash across your monitor, don’t get angry; reboot and then point your browser toward the DistroWatch Web site, where you can learn everything you need to know about the newest distributions (called “distros”) of the Linux operating system.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.