Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Security

Industry Confronts Privacy Concerns Head-On

October 2001
By Maryann Lawlor

While various Internet consumer privacy protection bills steadily make their way through U.S. congressional committees, businesses are taking a stab at self-governance. The work is based on the premise that commercial relationships demand trust, and the best way to gain customers' trust is to assure consumers that the information they provide, both automatically and intentionally, will not be shared without their permission. However, unless Web site visitors read published privacy policies, they may not be aware of how much of their personal data can be shared or sold.

Watch Out, Mobile Agents

October 2001
By Clarence A. Robinson Jr.

A fast-moving squad of government and industry computer security experts is preparing to swing into action. This computer-security-expert assist team is structured to support federal government agencies by providing ways to protect information technology systems and networks. The team's core will be industry members who are proficient in identifying and alleviating complex information system and infrastructure vulnerabilities.

Privacy vs. Protection: A Delicate Balance

November 2001
By Maryan Lawlor

It is hard to resist the Big Brother analogy to describe law enforcement agencies' use of new technologies for catching lawbreakers. From thermal scanners that monitor the amount of heat emanating from a suspect's house to hidden cameras that catch red-light runners to software that leads to the capture of cybercriminals, new capabilities have brought with them new privacy questions.

Flexible Defense for Uncertain Times

January 2002
By Henry S. Kenyon

A software-based access control system offers administrators and planners a secure option for wireless and online communications. Capable of working with legacy technologies, the scalable program forms a layered defense against unauthorized entry or use of network components.

Fortifying Diplomatic Security

January 2002
By the SIGNAL Staff

The U.S. State Department is conducting "junkyard dog" network penetration tests and vulnerability assessments at U.S. embassies and consulates worldwide. Simultaneously, a network intrusion detection program will provide rapid warning of unauthorized access to the department's far-flung sensitive information systems.

Securing the Perimeter Virtually

February 2002
By Henry S. Kenyon

A software analysis tool allows military and civilian managers of government facilities to evaluate vulnerability to terrorist attacks quickly. Now being installed at all U.S. military installations, the program calculates the risks that a variety of extremist organizations pose to a base or building, taking into account known tactics, methods of attack, preferred weapons and capabilities. This data is converted into graphics and three-dimensional models that can be stored and incorporated into reports.

Biometric Defense In Depth

May 2002
By Henry S. Kenyon

A recently developed software application will allow organizations to design layered access systems that scan individuals to recognize facial features, voices and lip movement characteristics. The program permits the deployment of a variety of digital-camera-based devices in kiosks and stations or desktop and laptop computers to control and monitor admittance to secure areas, networks or individual pieces of equipment.

Connections With Protections

August 2002
By Maryann Lawlor

Technology is now available that allows various organizations to share information from their databases without compromising their sources or individual agency policies. The software would enable national security and law enforcement groups to coordinate their efforts by facilitating the tracking of suspicious individuals and their activities.

Keeping Malicious Code at Bay

August 2002
By Henry S. Kenyon

Research is extending the boundaries of information assurance technology to include the operational reliability of individual systems and the ability of tactical wireless networks to remain secure. Scientists are developing agile solutions to counter new types of cyberassaults and to protect vulnerabilities detected in emerging technologies.

Government Enlists Industry for Information Security

August 2002
By Robert K. Ackerman

The United States has recruited private industry to help fight the war on terrorism on the home front. The next battlefield may be cyberspace, and the government is working with its operators to protect and defend crucial assets in that realm against attacks that could potentially cripple the country.

Pages

Subscribe to RSS - Security