Pub Date : 2011-11-01DOI: 10.1016/S1754-4548(11)70077-8
Fred Donovan
Commonly referred to as the year of the hack, it is no secret what 2011 has become famous for in the information security industry. This year's headlines, reports Fred Donovan, have been made up of data breaches, hacks, APT attacks and mergers and acquisitions
{"title":"Year of the Hack","authors":"Fred Donovan","doi":"10.1016/S1754-4548(11)70077-8","DOIUrl":"10.1016/S1754-4548(11)70077-8","url":null,"abstract":"<div><p>Commonly referred to as the year of the hack, it is no secret what 2011 has become famous for in the information security industry. This year's headlines, reports <strong>Fred Donovan</strong>, have been made up of data breaches, hacks, APT attacks and mergers and acquisitions</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 8-10"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70077-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85263625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-01DOI: 10.1016/S1754-4548(11)70083-3
Danny Bradbury
Should you have to give up privacy to get more security, or does one actually support the other? Danny Bradbury sounds out the experts
你是否应该放弃隐私来获得更多的安全性,或者两者实际上是相互支持的?丹尼·布拉德伯里听取了专家的意见
{"title":"Can Security and Privacy Co-exist?","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70083-3","DOIUrl":"10.1016/S1754-4548(11)70083-3","url":null,"abstract":"<div><p>Should you have to give up privacy to get more security, or does one actually support the other? <strong>Danny Bradbury</strong> sounds out the experts</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 33-35"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70083-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91430429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-01DOI: 10.1016/S1754-4548(11)70087-0
Sarb Sembhi
{"title":"Almost What it Says on the Tin","authors":"Sarb Sembhi","doi":"10.1016/S1754-4548(11)70087-0","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70087-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70087-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92087336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-01DOI: 10.1016/S1754-4548(11)70075-4
Eleanor Dallaway (Editor)
Within industry circles, 2011 has become known as the year of the hack, or the year of the black hat if you prefer. Game-changing malware has exploded, proving that the critical national infrastructure is under threat and that cyber war and cyber espionage are very daunting realities.
{"title":"Moving on Up","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70075-4","DOIUrl":"10.1016/S1754-4548(11)70075-4","url":null,"abstract":"<div><p>Within industry circles, 2011 has become known as the year of the hack, or the year of the black hat if you prefer. Game-changing malware has exploded, proving that the critical national infrastructure is under threat and that cyber war and cyber espionage are very daunting realities.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70075-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89591080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70065-1
Wendy M. Grossman
Most nations consider travel data to be crucial to protecting national security. How that data is collected, stored, and secured however seems to be a closely guarded secret. Wendy M. Grossman investigates
大多数国家认为旅行数据对保护国家安全至关重要。然而,如何收集、存储和保护这些数据似乎是一个严格保密的秘密。Wendy M. Grossman对此进行了调查
{"title":"Crossing Borders: The Right Side of Wrong?","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70065-1","DOIUrl":"10.1016/S1754-4548(11)70065-1","url":null,"abstract":"<div><p>Most nations consider travel data to be crucial to protecting national security. How that data is collected, stored, and secured however seems to be a closely guarded secret. <strong>Wendy M. Grossman</strong> investigates</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 22-25"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70065-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"112890616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70062-6
Drew Amorosi
The road from Minnesota to Washington has many stops, especially when you take the scenic route. Drew Amorosi recently met Patricia Titus of Unisys to regale in her remarkable journey
{"title":"Patricia Titus","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70062-6","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70062-6","url":null,"abstract":"<div><p>The road from Minnesota to Washington has many stops, especially when you take the scenic route. <strong>Drew Amorosi</strong> recently met Patricia Titus of Unisys to regale in her remarkable journey</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 9-12"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70062-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136736069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}