A software-based access control system offers administrators and planners a secure option for wireless and online communications. Capable of working with legacy technologies, the scalable program forms a layered defense against unauthorized entry or use of network components.
The U.S. State Department is conducting "junkyard dog" network penetration tests and vulnerability assessments at U.S. embassies and consulates worldwide. Simultaneously, a network intrusion detection program will provide rapid warning of unauthorized access to the department's far-flung sensitive information systems.
A software analysis tool allows military and civilian managers of government facilities to evaluate vulnerability to terrorist attacks quickly. Now being installed at all U.S. military installations, the program calculates the risks that a variety of extremist organizations pose to a base or building, taking into account known tactics, methods of attack, preferred weapons and capabilities. This data is converted into graphics and three-dimensional models that can be stored and incorporated into reports.
A recently developed software application will allow organizations to design layered access systems that scan individuals to recognize facial features, voices and lip movement characteristics. The program permits the deployment of a variety of digital-camera-based devices in kiosks and stations or desktop and laptop computers to control and monitor admittance to secure areas, networks or individual pieces of equipment.
Technology is now available that allows various organizations to share information from their databases without compromising their sources or individual agency policies. The software would enable national security and law enforcement groups to coordinate their efforts by facilitating the tracking of suspicious individuals and their activities.
Research is extending the boundaries of information assurance technology to include the operational reliability of individual systems and the ability of tactical wireless networks to remain secure. Scientists are developing agile solutions to counter new types of cyberassaults and to protect vulnerabilities detected in emerging technologies.
The United States has recruited private industry to help fight the war on terrorism on the home front. The next battlefield may be cyberspace, and the government is working with its operators to protect and defend crucial assets in that realm against attacks that could potentially cripple the country.
A recently developed identification authentication system permits personnel to receive single-use passwords via wireless devices, allowing users who are traveling or at remote sites to access their networks. The technology is compatible with a variety of equipment that supports text messaging such as cellular telephones, pagers, personal digital assistants and laptop computers.
Demands to increase information sharing and collaboration among government agencies are creating a growing requirement for easy-to-use security products that facilitate classified communications. Many organizations are now realizing the benefits of videoconferencing; however, information protection in this area generally involves support from communications security-certified personnel, and moving from unclassified to classified conferences requires cumbersome procedures.
A new approach to personal computer security confounds internal thieves and external hackers by making data disappear without a trace. The new security system effectively conceals the very existence of critical files and applications from all except the authorized user.