Search Results for "" Security ""
Not finding what you’re looking for?
10 of 242 Results
Security Solutions Ride Wi-Fi Wave
One of the key factors inhibiting the growth of the wireless fidelity market is security. The attractive wireless technology that offers a wide range of applications also is generating a wave of uncertainty about the fidelity of its connectivity.
Authenticating With Distinction
Information security researchers at George Washington University are studying new ways to strengthen identification authentication processes while keeping transactions as simple as possible. The techniques involve deliberate perturbations of traditional authentication processes and can be applied to password, token and biometric systems alike.
Government Maps Cyberspace Security Program
The newest U.S. government plan for cybersecurity proposes some short-term remedies while acknowledging that long-term security goals may take years to come to fruition. First published in draft form last fall, the new version establishes a list of priority programs but eschews detailed directives. This changes the thrust of the strategy from an operations manual to a list of guidelines.
Dark Screen Sheds Light on Cyberspace Security Issues
A recent exercise in San Antonio revealed how homeland security cooperation among civil authorities and the military involves more than hardware and software interoperability. Issues such as military capabilities, obligations and restrictions weighed heavily as participants sought to establish procedures to counter a potential cyberattack.
Uncooled Photonic Devices Shine
The U.S. Defense Department is developing miniaturized infrared detectors and sensors that do not require bulky cooling systems. These devices will be compact enough to fit in small robotic vehicles and microaircraft or will be manportable. The technology also may improve night vision and missile seeking equipment. Recent advances in physics and materials science are moving these devices from the laboratory to the battlefield.
We All Live in a See-All World
When the first commercial imaging satellite rocketed into outer space, few realized that a quiet revolution leading to total transparency had begun. Like the introduction of television, the advent of commercial satellite imagery has facilitated the dissemination of information to the world in graphic detail. But experts warn that this new capability could be a double-edged sword. Commercial satellite imagery is unveiling previously secretive activities to the court of public opinion where it can be scrutinized in a way never before possible.
Scout Tags Unknown Hackers
A new type of defensive software protects computer networks by actively identifying reconnaissance probes and blocking subsequent attacks. The program operates in front of a firewall by marking all incoming scans and probes. The mark consists of false data about servers and other applications. Any attempts to penetrate the system using the distorted information is treated as an attack and automatically stopped.
Desktop Security System Hides Data From Interlopers
A new approach to personal computer security confounds internal thieves and external hackers by making data disappear without a trace. The new security system effectively conceals the very existence of critical files and applications from all except the authorized user.
Virtual Token Leaves No Footprint
A recently developed identification authentication system permits personnel to receive single-use passwords via wireless devices, allowing users who are traveling or at remote sites to access their networks. The technology is compatible with a variety of equipment that supports text messaging such as cellular telephones, pagers, personal digital assistants and laptop computers.
Connections With Protections
Technology is now available that allows various organizations to share information from their databases without compromising their sources or individual agency policies. The software would enable national security and law enforcement groups to coordinate their efforts by facilitating the tracking of suspicious individuals and their activities.