July 1999 - Vol. 42 No. 7
Features
It used to be the hacker’s escapades were described by such benign expressions as "tap," "break in," "computer prank." But that was…
The design of a device that could quickly unscramble computer-generated code that until now has been considered secure was presented in Prague by one of the world’s…
Staying Connected: Telecom Act, Scene One
The phone rings constantly. I get lots of mail. And telecommunications companies of all shapes and sizes, from all geographical areas, want me to be a member of their…
From Washington: Infowar: Ak-47s, Lies, and Videotape
Information warfare is not just about "hacker war." Infowar is far broader and requires a much deeper reform of national security than simply adding a few…
Experiences with consumer-oriented, high-speed Internet access technology.
Viewpoint: Challenging the New Conventional Wisdom of Net Commerce Strategies
After years of hype, significant confusion exists among scholars and practitioners regarding expectations for e-commerce market development and the selection of effective…
As the wonders of global connectivity unfold, the world is changing its perception toward the use of computers. Computers are no longer viewed as mere number-crunching…
Inoculating Software For Survivability
An old adage holds true for software: you can build a stronger system by first breaking it.
A Cop on the Beat: Collecting and Appraising Intrusion Evidence
Effective intrusion detection, like police work, requires prioritization and careful fusion of evidence from disparate sources.
Testing and Evaluating Computer Intrusion Detection Systems
Your mission-critical software has vulnerabilities that intruders will try to exploit. The U.S. Air Force is developing new systems to catch hackers as they search for…
Intrusion Detection For Distributed Applications
A distributed application is vulnerable to attack code masquerading as one of the components. An application that has been trained to recognize "itself" can…
Prevention and detection receive most of the attention, but recovery is an equally important phase of information warfare defense.
The Jini Architecture For Network-Centric Computing
A federation of spontaneously networked electronic components of all types can communicate, interact, and share their services and functions, as explained by Jini's lead…
Securing information with the world's smallest combination lock.
The Dark Side of Employee Email
Sexual harassment via email may not only get you a stern rejection and cost you your job but leave an electronic trail of legal evidence that can be replayed and reread…
What's to stop someone—desperate to fulfill a publishing quota—from copying an article posted on a publicly available Web page,repackaging it under another…
Inside Risks: Information Is a Double-Edged Sword
As we begin the tenth year of this monthly column, it seems eminently clear that information technology has enormous benefits, but that it also can be put to undesirable…