Pub Date : 2006-11-01DOI: 10.1016/S1742-6847(06)70485-2
Ken Munro
Penetration testing often reveals the same old security issues, particularly with regard to the configuration and maintenance of databases. Some of these recurrent security problems are generic and affect nearly every database we have tested. Others are associated only with a particular vendor or version.
{"title":"Database security — an oxymoron?","authors":"Ken Munro","doi":"10.1016/S1742-6847(06)70485-2","DOIUrl":"10.1016/S1742-6847(06)70485-2","url":null,"abstract":"<div><p>Penetration testing often reveals the same old security issues, particularly with regard to the configuration and maintenance of databases. Some of these recurrent security problems are generic and affect nearly every database we have tested. Others are associated only with a particular vendor or version.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 42"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70485-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73982065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-11-01DOI: 10.1016/S1742-6847(06)70467-0
Brian McKenna
{"title":"US and UK government documents leak confidential data","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70467-0","DOIUrl":"10.1016/S1742-6847(06)70467-0","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70467-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84457193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70464-5
Jay Heiser
{"title":"Pity about the people","authors":"Jay Heiser","doi":"10.1016/S1742-6847(06)70464-5","DOIUrl":"10.1016/S1742-6847(06)70464-5","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70464-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75383503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70455-4
Stefan Krempl
Hacking incidents mean university leaders have to secure their networks better. But they have to reconcile stricter security with an open computing environment and a user community that is formally required to test their environment to breaking point.
{"title":"Universities need lessons in IT security","authors":"Stefan Krempl","doi":"10.1016/S1742-6847(06)70455-4","DOIUrl":"10.1016/S1742-6847(06)70455-4","url":null,"abstract":"<div><p>Hacking incidents mean university leaders have to secure their networks better. But they have to reconcile stricter security with an open computing environment and a user community that is formally required to test their environment to breaking point.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 24-26"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70455-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80470447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70453-0
Danny Bradbury
Captchas are designed to thwart software bots, but how can you stop them thwarting humans too?
验证码是用来阻止软件机器人的,但你怎么能阻止它们也来阻止人类呢?
{"title":"War of the words","authors":"Danny Bradbury","doi":"10.1016/S1742-6847(06)70453-0","DOIUrl":"10.1016/S1742-6847(06)70453-0","url":null,"abstract":"<div><p>Captchas are designed to thwart software bots, but how can you stop them thwarting humans too?</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 14, 16-17"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70453-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82303532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70461-X
Brian Honan
Information security is not just IT security. The better we understand that, the better off we'll be.
信息安全不仅仅是IT安全。我们对这一点了解得越透彻,我们就会过得越好。
{"title":"IT security – commoditized, badly","authors":"Brian Honan","doi":"10.1016/S1742-6847(06)70461-X","DOIUrl":"10.1016/S1742-6847(06)70461-X","url":null,"abstract":"<div><p>Information security is not just IT security. The better we understand that, the better off we'll be.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 41"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70461-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80705395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70456-6
Brian McKenna
Bruce Schneier is an American computer security expert, cryptographer, and writer. His books include Applied Cryptography (1996), Secrets and Lies (2000), and Beyond Fear (2003). He publishes a free monthly newsletter, ‘Cryptogram', and blogs at http://www.schneier.com/blog/. He is the founder and chief technology officer of Counterpane Internet Security. This autumn he'll be speaking at ISSE 2006 in Rome, on the topic of the economics of security. He recently spoke with Brian McKenna for Infosecurity Today.
布鲁斯·施奈尔是美国计算机安全专家、密码学家和作家。他的著作包括《应用密码学》(1996)、《秘密与谎言》(2000)和《超越恐惧》(2003)。他每月出版一份免费的时事通讯“Cryptogram”,并在http://www.schneier.com/blog/上发表博客。他是Counterpane Internet Security公司的创始人和首席技术官。今年秋天,他将在2006年罗马国际安全经济会议上发表演讲,主题是安全经济学。他最近接受了Brian McKenna的采访。
{"title":"It's political economy, stupid","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70456-6","DOIUrl":"10.1016/S1742-6847(06)70456-6","url":null,"abstract":"<div><p>Bruce Schneier is an American computer security expert, cryptographer, and writer. His books include <em>Applied Cryptography</em> (1996), <em>Secrets and Lies</em> (2000), and <em>Beyond Fear</em> (2003). He publishes a free monthly newsletter, ‘Cryptogram', and blogs at <span>http://www.schneier.com/blog/</span><svg><path></path></svg>. He is the founder and chief technology officer of Counterpane Internet Security. This autumn he'll be speaking at ISSE 2006 in Rome, on the topic of the economics of security. He recently spoke with Brian McKenna for <em>Infosecurity Today</em>.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 28-29"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70456-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74662496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70454-2
Ron Condon
Relative wealth and open social mores give Scandinavians a relaxed attitude to personal infosecurity, but Cold War paranoia and safety concerns have also sharpened their edge in digital security technology.
{"title":"Far from grim up North","authors":"Ron Condon","doi":"10.1016/S1742-6847(06)70454-2","DOIUrl":"10.1016/S1742-6847(06)70454-2","url":null,"abstract":"<div><p>Relative wealth and open social mores give Scandinavians a relaxed attitude to personal infosecurity, but Cold War paranoia and safety concerns have also sharpened their edge in digital security technology.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 20-22"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70454-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77759198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}