首页 > 最新文献

Infosecurity Today最新文献

英文 中文
Database security — an oxymoron? 数据库安全——一个矛盾修饰法?
Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70485-2
Ken Munro

Penetration testing often reveals the same old security issues, particularly with regard to the configuration and maintenance of databases. Some of these recurrent security problems are generic and affect nearly every database we have tested. Others are associated only with a particular vendor or version.

渗透测试经常会暴露出同样的安全问题,特别是在数据库的配置和维护方面。其中一些反复出现的安全问题是通用的,几乎影响到我们测试过的每个数据库。其他的仅与特定的供应商或版本相关联。
{"title":"Database security — an oxymoron?","authors":"Ken Munro","doi":"10.1016/S1742-6847(06)70485-2","DOIUrl":"10.1016/S1742-6847(06)70485-2","url":null,"abstract":"<div><p>Penetration testing often reveals the same old security issues, particularly with regard to the configuration and maintenance of databases. Some of these recurrent security problems are generic and affect nearly every database we have tested. Others are associated only with a particular vendor or version.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 42"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70485-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73982065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
US and UK government documents leak confidential data 美国和英国政府文件泄露机密数据
Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70467-0
Brian McKenna
{"title":"US and UK government documents leak confidential data","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70467-0","DOIUrl":"10.1016/S1742-6847(06)70467-0","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70467-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84457193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breaking web software 破坏网络软件
Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70487-6
Charles Pfleeger
{"title":"Breaking web software","authors":"Charles Pfleeger","doi":"10.1016/S1742-6847(06)70487-6","DOIUrl":"10.1016/S1742-6847(06)70487-6","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70487-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83664237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BT buys Counterpane to boost IT security services 英国电信收购Counterpane以提升IT安全服务
Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70471-2
{"title":"BT buys Counterpane to boost IT security services","authors":"","doi":"10.1016/S1742-6847(06)70471-2","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70471-2","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70471-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92115794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pity about the people 对人民的怜悯
Pub Date : 2006-09-01 DOI: 10.1016/S1742-6847(06)70464-5
Jay Heiser
{"title":"Pity about the people","authors":"Jay Heiser","doi":"10.1016/S1742-6847(06)70464-5","DOIUrl":"10.1016/S1742-6847(06)70464-5","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70464-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75383503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Universities need lessons in IT security 大学需要IT安全方面的课程
Pub Date : 2006-09-01 DOI: 10.1016/S1742-6847(06)70455-4
Stefan Krempl

Hacking incidents mean university leaders have to secure their networks better. But they have to reconcile stricter security with an open computing environment and a user community that is formally required to test their environment to breaking point.

黑客事件意味着大学领导必须更好地保护他们的网络。但是,他们必须将更严格的安全性与开放的计算环境和正式要求测试其环境到极限的用户社区相协调。
{"title":"Universities need lessons in IT security","authors":"Stefan Krempl","doi":"10.1016/S1742-6847(06)70455-4","DOIUrl":"10.1016/S1742-6847(06)70455-4","url":null,"abstract":"<div><p>Hacking incidents mean university leaders have to secure their networks better. But they have to reconcile stricter security with an open computing environment and a user community that is formally required to test their environment to breaking point.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 24-26"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70455-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80470447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
War of the words 口水战
Pub Date : 2006-09-01 DOI: 10.1016/S1742-6847(06)70453-0
Danny Bradbury

Captchas are designed to thwart software bots, but how can you stop them thwarting humans too?

验证码是用来阻止软件机器人的,但你怎么能阻止它们也来阻止人类呢?
{"title":"War of the words","authors":"Danny Bradbury","doi":"10.1016/S1742-6847(06)70453-0","DOIUrl":"10.1016/S1742-6847(06)70453-0","url":null,"abstract":"<div><p>Captchas are designed to thwart software bots, but how can you stop them thwarting humans too?</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 14, 16-17"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70453-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82303532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IT security – commoditized, badly IT安全——严重商品化
Pub Date : 2006-09-01 DOI: 10.1016/S1742-6847(06)70461-X
Brian Honan

Information security is not just IT security. The better we understand that, the better off we'll be.

信息安全不仅仅是IT安全。我们对这一点了解得越透彻,我们就会过得越好。
{"title":"IT security – commoditized, badly","authors":"Brian Honan","doi":"10.1016/S1742-6847(06)70461-X","DOIUrl":"10.1016/S1742-6847(06)70461-X","url":null,"abstract":"<div><p>Information security is not just IT security. The better we understand that, the better off we'll be.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 41"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70461-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80705395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
It's political economy, stupid 这是政治经济学,笨蛋
Pub Date : 2006-09-01 DOI: 10.1016/S1742-6847(06)70456-6
Brian McKenna

Bruce Schneier is an American computer security expert, cryptographer, and writer. His books include Applied Cryptography (1996), Secrets and Lies (2000), and Beyond Fear (2003). He publishes a free monthly newsletter, ‘Cryptogram', and blogs at http://www.schneier.com/blog/. He is the founder and chief technology officer of Counterpane Internet Security. This autumn he'll be speaking at ISSE 2006 in Rome, on the topic of the economics of security. He recently spoke with Brian McKenna for Infosecurity Today.

布鲁斯·施奈尔是美国计算机安全专家、密码学家和作家。他的著作包括《应用密码学》(1996)、《秘密与谎言》(2000)和《超越恐惧》(2003)。他每月出版一份免费的时事通讯“Cryptogram”,并在http://www.schneier.com/blog/上发表博客。他是Counterpane Internet Security公司的创始人和首席技术官。今年秋天,他将在2006年罗马国际安全经济会议上发表演讲,主题是安全经济学。他最近接受了Brian McKenna的采访。
{"title":"It's political economy, stupid","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70456-6","DOIUrl":"10.1016/S1742-6847(06)70456-6","url":null,"abstract":"<div><p>Bruce Schneier is an American computer security expert, cryptographer, and writer. His books include <em>Applied Cryptography</em> (1996), <em>Secrets and Lies</em> (2000), and <em>Beyond Fear</em> (2003). He publishes a free monthly newsletter, ‘Cryptogram', and blogs at <span>http://www.schneier.com/blog/</span><svg><path></path></svg>. He is the founder and chief technology officer of Counterpane Internet Security. This autumn he'll be speaking at ISSE 2006 in Rome, on the topic of the economics of security. He recently spoke with Brian McKenna for <em>Infosecurity Today</em>.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 28-29"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70456-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74662496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Far from grim up North 北方远没有那么可怕
Pub Date : 2006-09-01 DOI: 10.1016/S1742-6847(06)70454-2
Ron Condon

Relative wealth and open social mores give Scandinavians a relaxed attitude to personal infosecurity, but Cold War paranoia and safety concerns have also sharpened their edge in digital security technology.

相对富裕和开放的社会习俗使斯堪的纳维亚人对个人信息安全持宽松态度,但冷战时期的偏执和对安全的担忧也增强了他们在数字安全技术方面的优势。
{"title":"Far from grim up North","authors":"Ron Condon","doi":"10.1016/S1742-6847(06)70454-2","DOIUrl":"10.1016/S1742-6847(06)70454-2","url":null,"abstract":"<div><p>Relative wealth and open social mores give Scandinavians a relaxed attitude to personal infosecurity, but Cold War paranoia and safety concerns have also sharpened their edge in digital security technology.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 20-22"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70454-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77759198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Infosecurity Today
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1