July 1999 - Vol. 42 No. 7
Features
It used to be the hacker’s escapades were described by such benign expressions as "tap," "break in," "computer prank." But that was before the stakes got so high, the data so robust, the damage potential so deadly. Today, hacking is no longer "child’s play." Oh, no. Today, it’s "war." An attack on an organization’s information […]
The design of a device that could quickly unscramble computer-generated code that until now has been considered secure was presented in Prague by one of the world’s foremost cryptographers, Adi Shamir, coinventor of R.S.A., the international standard for secure transmission. Shamir’s idea combines existing technology into a special, reasonably priced computer that would make factoring […]
In the April Viewpoint ("Taking the Lead in Licensing Software Engineers," p. 27), Donald Bagert trots out the old chestnut about the need to certify software engineers. Licensing and certification are such dimwitted ideas that if Texas (where Bagert is from) were to remain the only state to require them, the software industry in Texas […]
Staying Connected: Telecom Act, Scene One
The phone rings constantly. I get lots of mail. And telecommunications companies of all shapes and sizes, from all geographical areas, want me to be a member of their special customer family. I’ve been chosen. And I’m honored, really. In fact, so much so that when Bob T. calls me from the MCI WorldCom family […]
From Washington: Infowar: Ak-47s, Lies, and Videotape
Information warfare is not just about "hacker war." Infowar is far broader and requires a much deeper reform of national security than simply adding a few thousand well-paid sysadmins. Throughout the continuing wars in Rwanda and what was once Zaire, TV journalists and aid workers were used and abused by the warring parties. In 1994, […]
Experiences with consumer-oriented, high-speed Internet access technology.
Viewpoint: Challenging the New Conventional Wisdom of Net Commerce Strategies
After years of hype, significant confusion exists among scholars and practitioners regarding expectations for e-commerce market development and the selection of effective Internet commerce strategies. Adding to this confusion is the realization that several assertions in the early stages of Internet commerce have not materialized as predicted. Lessons from the several billion dollars in Internet […]
As the wonders of global connectivity unfold, the world is changing its perception toward the use of computers. Computers are no longer viewed as mere number-crunching devices nor is the use of computers limited to the scientific and engineering communities. The advent of high-speed networking technologies has made information sharing through the Internet a prevailing practice for every conceivable segment of society from governments to business and industry to private citizens.
Inoculating Software For Survivability
An old adage holds true for software: you can build a stronger system by first breaking it.
A Cop on the Beat: Collecting and Appraising Intrusion Evidence
Effective intrusion detection, like police work, requires prioritization and careful fusion of evidence from disparate sources.
Testing and Evaluating Computer Intrusion Detection Systems
Your mission-critical software has vulnerabilities that intruders will try to exploit. The U.S. Air Force is developing new systems to catch hackers as they search for weak points.
Intrusion Detection For Distributed Applications
A distributed application is vulnerable to attack code masquerading as one of the components. An application that has been trained to recognize "itself" can reject such imposters.
Prevention and detection receive most of the attention, but recovery is an equally important phase of information warfare defense.
The Jini Architecture For Network-Centric Computing
A federation of spontaneously networked electronic components of all types can communicate, interact, and share their services and functions, as explained by Jini's lead architect.
Securing information with the world's smallest combination lock.
The Dark Side of Employee Email
Sexual harassment via email may not only get you a stern rejection and cost you your job but leave an electronic trail of legal evidence that can be replayed and reread in a court of law.
What's to stop someone—desperate to fulfill a publishing quota—from copying an article posted on a publicly available Web page,repackaging it under another byline, and resubmitting it to another journal?
Inside Risks: Information Is a Double-Edged Sword
As we begin the tenth year of this monthly column, it seems eminently clear that information technology has enormous benefits, but that it also can be put to undesirable use. Market forces have produced many wonderful products and services, but they do not ensure beneficial results. Many systems are technologically incapable of adequately supporting society-critical […]