Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo


Connections With Protections

August 2002
By Maryann Lawlor

Technology is now available that allows various organizations to share information from their databases without compromising their sources or individual agency policies. The software would enable national security and law enforcement groups to coordinate their efforts by facilitating the tracking of suspicious individuals and their activities.

Keeping Malicious Code at Bay

August 2002
By Henry S. Kenyon

Research is extending the boundaries of information assurance technology to include the operational reliability of individual systems and the ability of tactical wireless networks to remain secure. Scientists are developing agile solutions to counter new types of cyberassaults and to protect vulnerabilities detected in emerging technologies.

Government Enlists Industry for Information Security

August 2002
By Robert K. Ackerman

The United States has recruited private industry to help fight the war on terrorism on the home front. The next battlefield may be cyberspace, and the government is working with its operators to protect and defend crucial assets in that realm against attacks that could potentially cripple the country.

Virtual Token Leaves No Footprint

September 2002
By Henry S. Kenyon

A recently developed identification authentication system permits personnel to receive single-use passwords via wireless devices, allowing users who are traveling or at remote sites to access their networks. The technology is compatible with a variety of equipment that supports text messaging such as cellular telephones, pagers, personal digital assistants and laptop computers.

System Protects Video Communications

September 2004
By Maryann Lawlor

Demands to increase information sharing and collaboration among government agencies are creating a growing requirement for easy-to-use security products that facilitate classified communications. Many organizations are now realizing the benefits of videoconferencing; however, information protection in this area generally involves support from communications security-certified personnel, and moving from unclassified to classified conferences requires cumbersome procedures.

Desktop Security System Hides Data From Interlopers

October 2002
By Robert K. Ackerman

A new approach to personal computer security confounds internal thieves and external hackers by making data disappear without a trace. The new security system effectively conceals the very existence of critical files and applications from all except the authorized user.

Preparing to Protect The Digital Force

November 2001
By Maryann Lawlor

The U.S. Army is pushing to ensure that the people in charge of the latest tools in warfare are up to date in defending its information and computer networks. Personnel who are key to the service's transformation and its move to digitizing the force are being trained to install, configure, operate and maintain the latest communications systems and are learning to identify evolving threats to these systems.

Scout Tags Unknown Hackers

November 2002
By Henry S. Kenyon

A new type of defensive software protects computer networks by actively identifying reconnaissance probes and blocking subsequent attacks. The program operates in front of a firewall by marking all incoming scans and probes. The mark consists of false data about servers and other applications. Any attempts to penetrate the system using the distorted information is treated as an attack and automatically stopped.

Open Line, Hidden Key

December 2000
By Henry S. Kenyon

By manipulating the slippery and elusive qualities of matter's smallest components, scientists have developed a way to encode and send data along unsecured public fiber optic lines. The method relies on the unique nature of atomic behavior-any attempt by an outside party to analyze the coded material changes the atoms' characteristics, rendering the transmission useless.

Dark Screen Sheds Light on Cyberspace Security Issues

January 2003
By Dr. Gregory B. White and Joe H. Sanchez Jr.

A recent exercise in San Antonio revealed how homeland security cooperation among civil authorities and the military involves more than hardware and software interoperability. Issues such as military capabilities, obligations and restrictions weighed heavily as participants sought to establish procedures to counter a potential cyberattack.


Subscribe to RSS - Security