Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available
نویسنده
چکیده
Stuart McClure is the lead author of the best-selling security book Hacking Exposed: Network Security Secrets and Solutions (Osborne/McGraw-Hill), and since 1998 has been co-authoring the weekly “Security Watch” column in InfoWorld. Previously, as Security Analyst for the InfoWorld Test Center, he evaluated almost 100 network and security products in the area of firewalls, security auditing, intrusion detection and Public Key Infrastructure products.
منابع مشابه
Security and Privacy Challenges of a Digital Government
A digital government can be viewed as an amalgam of heterogeneous information systems that exchange high-volume information among government agencies and public and private sectors engaged in government business. This gives rise to several daunting multidomain security challenges as well as concern for citizen privacy. The success of a digital government infrastructure depends on how well it me...
متن کاملEthical Aspects of Information Security and Privacy
This essay reviews ethical aspects of computer and information security and privacy. After an introduction of ethical approaches to information technology , the focus is first on ethical aspects of computer security. These include the moral importance of computer security, the relation between computer security and national security, the morality of hacking and computer crime, the nature of cyb...
متن کاملWhy Clouds Give Me a Case of the Vapors
A ccording to Apple, “ ... certain celebrity accounts were compromised by a very targeted attack on user names, passwords, and security questions.”1 Didn’t we cover defensive privacy tactics in my January column?2 Color me dazed and confused! Hacking in cyberspace? Nothing like that’s ever happened before. (I’ve got another heads-up for you iPhone users—Siri talks about you behind your back. I’...
متن کاملMapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model
This paper present 18 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Atta...
متن کاملSecurity of Mobile Phones and their Usage in Business
The purpose of this document is to provide an overview on the growth on mobile phone and PDA devices and use in business-oriented modern day life style. The explosion of smartphones in enterprise and personal computing heighten the concerns of security and privacy of users. Now a day’s use of mobile is in every walk of life like shopping, trading, paying bill and even using internet banking. Bu...
متن کامل