Home > Articles > Security

Security

722 Items

Sort by Date | Title

Information Security Must Balance Business Objectives
May 24, 2002
Information security is a relative term. It is effective only when it is balanced with business requirements, cost, and risk mitigation. Learn how to determine security requirements that mesh effectively with your business objectives, create policies that work for your organization, and use technology to implement your policies.
Internetwork Security Overview
May 17, 2002
Network security controls the confidentiality, integrity, and availability of information. Although there is no such thing as a truly secure system, you must audit your security frequently, and make it work for system users.
Internet Infrastructure Components: A 10,000-Foot View
May 10, 2002
The Internet still utilizes the same inherently insecure TCP/IP infrastructure developed in the late 1970s and early 1980s, so security must be a critical consideration of businesses and home users.
Deitel Presents An Introduction to Denial-of-Service Attacks in Perl
May 1, 2002
Deitel™ introduces Perl security and Denial-of-Service attacks. Readers should be familiar with Perl programming, regular expressions, basic CGI, basic file processing and an understanding of HTTP requests and responses.
How Do You Know If Something's Amiss? Characterize Your Systems
May 1, 2002
Administrators need to know what "normal" means if they want to handle days when the system goes wacko, say Julia Allen and Larry Rogers of the CERT Coordination Center.
The Cisco IOS Firewall Feature Set
May 1, 2002
Anu Tewari covers the basic components of the Cisco IOS Firewall Feature Set and tells how it can help a business guard against security breaches.
Information Gathering: Who Wants to Know What about Whom?
Apr 19, 2002
How much are you willing to pay for convenience? Not just money and time, but information? Two privacy experts help you decide how much information is too much information to give.
"Open Sesame" or Not? Use the Right Access Controls
Apr 12, 2002
"Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
Privacy Organizations and Initiatives
Apr 12, 2002
Find out how some organizations are fighting to protect your right to privacy, even as technology becomes steadily more invasive.
Firewall Deployment for Multi-Tier Applications
Apr 5, 2002
Firewalls can be deployed in numerous ways as part of a security perimeter around Internet-facing servers. Lenny Zeltser explains here how to use firewalls to separate network resources in a way that suits multitier applications.
Learn Host-Based Intrusion Detection
Apr 5, 2002
Follow the step-by-step examples to learn how to use five major host-based intrusion detection tools: TCP Wrappers, xinetd, Tripwire, Swatch, and PortSentry.
Night of the Living Wi-Fi's (A Security Parable for Our Times)
Apr 5, 2002
Ed Skoudis' true-to-life scenario sends chills up the spine of any business with employees using unsecured wireless access.
See What Your Attacker Sees with Scanning Tools
Apr 5, 2002
Defend against attacks by examining your systems from the viewpoint of the attacker. You can use the same tools to protect your systems that attackers use to break in to your systems. Learn how here.
Upgrading Software Development Security
Apr 5, 2002
Information security expert Scott Barman discusses how to create a secure development program within an existing software development process. Organizations such as Microsoft may need to consider such policies in their heightened concentration on security.
Writing Mobile Code Policies
Apr 5, 2002
Information security expert Scott Barman discusses how to think about and create a policy on using mobile code that will work within the security infrastructure of your organization's network environment.
Attacks from Outside the Operating System
Mar 29, 2002
This excerpt from Andy Tanenbaum's Modern Operating Systems looks at some of the operating systems aspects of external threats, primarily focusing on viruses, worms, mobile code, and Java applets.
Linux Firewalls: Packet Filtering
Mar 29, 2002
This sample chapter covers the basic concepts and mechanisms on which a packet-filtering firewall is based, and explains what network communication is, what a packet it, and how network-based services are identified.
Preparing Your Enterprise for Tighter Security
Mar 29, 2002
The authors of Securing Business Information show you how to ready your business for crucial security measures, including building the proper organization and marketing the mission within the business.
Configuring OpenSSH for the Solaris Operating Environment
Mar 22, 2002
This article deals with server and client configurations, key management, and integration into existing environments for the Solaris Operating Environment (OE).
Forming and Managing an Incident Response Team
Mar 22, 2002
This sample chapter delves into forming and managing an incident response team - what a response team is, the rationale for forming an incident response team, major issues that must be addressed, and special management considerations.

<< < Prev Page 28 29 30 31 32 Next >