Security Watch

نویسنده

  • Rebecca T. Mercuri
چکیده

I n the computer industry, standards play an important role by enforcing security baselines and enabling compatibilities among products. In the early days of computing, lacking common agreements, problems ensued with floating point configurations, ASCII vs. EBCDIC encoding battles, and little vs. big endian data mixups. Such issues, especially when they affect data integrity, can pose a security risk. In the best of worlds, standards provide a neutral ground where methodologies are established that advance the interests of manufacturers as well as consumers, while providing assurances of safety and reliability. At the opposite extreme, standards can be inappropriately employed to favor some vendors’ products over others, make competition costly, and encourage mediocrity over innovation, all of which can have negative effects on security. In this column, I consider the current standards environment and offer some suggestions for its increased understanding and improvement. A host of computer security standards currently exist, including those for general use like the

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How Secure is Your Smart Watch?

The Internet of Things (IoT) is a network of devices, vehicles, buildings and other items which are able to collect and exchange data. IoT devices are furnished with technologies such as electronics, software, sensors, actuators, and network connectivity in order to function as desired. A smart watch can be considered as an IoT device as they are equipped by almost all necessary technologies. I...

متن کامل

Making Effective Home Security Available to Everyone - Towards Smart Home Security Communities

The Internet of Things significantly reduces the prices of home security systems, thereby making home security available to everyone. Prior research provides the technical foundation for Smart Home security. However, frequent false alarms still remain a severe challenge. While current work in this domain mainly focuses on the improvement of sensors and algorithms, this study proposes a semi-aut...

متن کامل

Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available

Stuart McClure is the lead author of the best-selling security book Hacking Exposed: Network Security Secrets and Solutions (Osborne/McGraw-Hill), and since 1998 has been co-authoring the weekly “Security Watch” column in InfoWorld. Previously, as Security Analyst for the InfoWorld Test Center, he evaluated almost 100 network and security products in the area of firewalls, security auditing, in...

متن کامل

Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks

In this paper we present a clock frequency watch dog that can be realized using a digital standard CMOS library. Such watch dog is required to prevent clock speed manipulations that can support side channel attacks on cryptographic hardware devices. The additional area and power consumed by the watch dog for an AES hardware accelerator are 4,200μm and 2nJ per 128 bit respectively. The physical ...

متن کامل

‘Working Together’: Neighbourhood Watch, Reassurance Policing and the Potential of Partnerships

Few well designed evaluations have found strong support for neighbourhood watch (NW) schemes; in fact there have been no formal, published, peer reviewed evaluations of NW in Australia. This paper argues for a change in focus in what is examined to determine success. Overseas evaluations suggest such schemes are ineffective because they looked at whether NW prevented and reduced the fear of cri...

متن کامل

ProtoViz: A Simple Security Protocol Visualization

This report describes ProtoViz, a small Java applet used for rudimentary visualization of security protocols. The applet parses protocol descriptions written in a simple specification language and builds an animated visualization from this description using a simple visual grammar. The user can then play the animation to watch the protocol “in action”, and is able to easily modify parts of the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003