INFORMATION

Site Map - IT

Password Security

- The weakest link in computer network security isn’t technology, it’s users, concludes a new government survey from the United Kingdom. Find out why passwords are key.

IT Security

- Peer-to-peer file-sharing networks pose a severe risk of inadvertent disclosure for large financial institutions, say researchers from the Center for Digital Strategies.

Web Protections

- Consumers will pay more money to shop on a retailer’s Web site with strong privacy protections according to a Carnegie Mellon study.

Email Privacy

- E-mail accounts stored by an Internet service provider carry the expectation of privacy, ruled a federal appeals court. The government must obtain a warrant or tell the e-mail account’s owner a subpoena has been issued for that information.

A Site to See

- The next time you see Microsoft Windows’ “blue screen of death” or a “fatal error” message flash across your monitor, don’t get angry; reboot and then point your browser toward the DistroWatch Web site, where you can learn everything you need to know about the newest distributions (called “distros”) of the Linux operating system.

Laws to Aid Breach Victims

- A data breach at ChoicePoint in February 2005 was “a watershed event in terms of disclosure to the affected individuals,” according to a paper from the Privacy Rights Clearinghouse.

Web Sites Provide Rich Harvest for Spammers

- If your e-mail address is posted on a Web site, the chances of it being “harvested” by a spammer are much greater than if the address appears on a blog, on a message board, or in a chat room. That’s one finding from a study conducted by the Federal Trade Commission (FTC), whose investigators created 150 e-mail accounts—50 with an Internet service provider (ISP) that does not use antispam filtering, and 50 each at two other ISPs that do filter for spam—to learn more about how to reduce spam. @ E-mail Address Harvesting and the Effectiveness of Anti-SpamFfilters, a report by the federal trade commission’s division of marketing practices, is at SM Online.

Today Preemptive, Tomorrow Predictive

- Collecting data is all well and good, but the real question is how multiple data points can be intelligently reviewed to help security personnel make better decisions in real time. That's where security analytics comes in. @ The business of connecting the dots: the $1 billion intelligence and security informatics/analytics market is available on SM Online.

Trojans Bearing Gifts

- Malicious code threats continue to rise, according to this software company report.

IT Gets Respect

- According to a survey of IT in the corporate world, the importance of IT security professionals is finally being recognized.

Computer Forensics: Computer Crime Scene Investigation, Second Edition

- For novices or general security practitioners, on the other hand, the information can be bewildering. The information is too detailed and complicated for beginners.

Digital Evidence and Computer Crime, Second Edition

- The bits-and-bytes material is cushioned by rich context, with sections addressing the history of computer crime and the methods and mind-sets of computer criminals.

And the Incorrect Answer Is: “No Comment"

- Why is “No comment” the wrong response to any media question? According to the authors, those words precipitate questions such as, “What are you trying to hide?” and “What’s really going on here?” They offer tips on what needs to be said and how to say it.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.