Search Results for "" Security ""
Not finding what you’re looking for?
10 of 242 Results
Industry Confronts Privacy Concerns Head-On
While various Internet consumer privacy protection bills steadily make their way through U.S. congressional committees, businesses are taking a stab at self-governance. The work is based on the premise that commercial relationships demand trust, and the best way to gain customers' trust is to assure consumers that the information they provide, both automatically and intentionally, will not be shared without their permission. However, unless Web site visitors read published privacy policies, they may not be aware of how much of their personal data can be shared or sold.
Watch Out, Mobile Agents
A fast-moving squad of government and industry computer security experts is preparing to swing into action. This computer-security-expert assist team is structured to support federal government agencies by providing ways to protect information technology systems and networks. The team's core will be industry members who are proficient in identifying and alleviating complex information system and infrastructure vulnerabilities.
Privacy in the Public Domain
When the framers of the U.S. Constitution outlined citizens' rights, they could not have foreseen the birth of communications capabilities that would pervade both personal and professional life. Although the fourth amendment is very clear in its prohibition of unreasonable search and seizure, technology has blurred the line between what is considered public and private space. Privacy policy watchdog groups believe that the biggest challenge may be that technology seems to develop at the speed of light, while the legal protection of personal privacy moves at the speed of legislators.
Cyberspace Forces Gear Up
The U.S. Defense Department is moving ahead with plans to engage Reserve forces further to protect and defend military information systems. The approach takes advantage of available expertise by making it easier for civilian information assurance specialists to put their skills to work for the military.
Technology Challenges Vex Security Agency
Balancing function against security may prove to be the tightrope act that determines the future of information assurance. Government and commercial experts are weighing the convenience and capabilities of new technologies against their vulnerability to the burgeoning threat from all corners of cyberspace.
A Powerful Vision
Protecting warfighting information technology systems requires the same situational awareness for networks that battlefield commanders rely on to maneuver forces to outflank and engage an enemy at maximum effective range. Without a near-real-time picture of the U.S. Defense Department's Global Information Grid, the bubble could burst, leaving in question warfighter network defenses.
Fusion Center Unites Diverse Research Groups
The U.S. Defense Department has established a facility to evaluate and integrate biometric identification systems for military and federal agencies. Charged with multiple responsibilities, this center also serves as a place where government, academia and industry can share their expertise and knowledge.
Human Element Key to Intrusion Detection
The U.S. Air Force is researching an information assurance system that incorporates the human factor into protecting data. The system would help analysts charged with monitoring networks identify potential breaches more easily by removing clutter and presenting them with a clear assessment of the danger level.
Smart Software Sniffs Out Trouble
A security management system allows administrators to track computer network threats by providing near-real-time alerts from remote sensors on the network. Software agents, tailored to be expert monitors of specific programs and devices, use rules sets to sift through data before sending reports to a central management engine that tracks and correlates the information. Thousands of potential alerts then are analyzed and reduced to one or two dozen incidents that require immediate attention.
Cyberguardian Keeps Hackers, Insider Threats at Bay
Smart hardware will allow administrators to foil intruders and internal attackers before they can cripple computer systems. The firewall, embedded within a network interface card, creates a tamper-resistant security layer that cannot be subverted or deactivated like traditional software-based defenses. When installed on desktop computers and servers throughout an organization, the cards selectively permit or deny certain types of activities at the department, office or individual levels.