Security


Preparing for the Unthinkable

Control the damage

Critical Response Teamwork

Suddenly, you're faced with yet another intrusion, attack, abuse, virus or worm. Who should you call? What will you do immediately and long-term? Will your company even know it's been violated?

Handing Off Security

Internet security is not just a network problem.

Security Angst

Enterprise managers, your end users are teenagers now; they’re running amok and defying authority simply because they can. They’re doing it subtly by playing on the Internet and by obscuring their non-business use of your systems, and aggressively by destroying property when disgruntled. Ignoring these threats from within will only encourage them.

Pandora's Box or Panacea?

Is PKI all what it's cracked up to be?

That Insecure Feeling

Rigorous security and high cost of ownership have kept mainframes safe from hackers. But as they become key players in e-business, mainframes could be at risk.



Don't Ask, Don't Tell

In the days before desktops, when IT was MIS and the words computer and mainframe were synonymous, non-MIS employees weren't supposed to understand, let alone attempt to learn about, anything digital. They weren't supposed to ask, and MIS wasn't supposed to tell.

Firewalls Fill the Gap

Firewalls are evolving to accommodate today's sprawling enterprise systems. Several types of products can enhance your security and peace of mind.

E-Security: Growing Threats Require New Strategies

Reaching out to as many customers as possible means corporate e-business strategies need to consider strategic approaches to e-security as well.

Security

Just as explorers introduced disease to previously isolated populations, opening up corporate systems has added a slew of challenges. Although security policies were originally designed to keep unwanted intruders out, they now must also let the right people in, and do it as quickly and seamlessly as possible.

Life as a Security Guru

Jim Craft is on a quest to secure information.

Fighting Fires on the Web

Make no mistake: Moving applications onto the Web merely makes disaster recovery planning even more critical.

Eat the WORM: First Realtime Tests Help Determine Security of Data Stored on WORM Media

How long will write-once-read-many (WORM) technology last? Up to now, this technology simply hasn't been around long enough to even take a stab at answering this question based on realtime testing. However, recently the maturity of optical WORM technology reached the point where it has finally become possible to test media that was written a considerable period of time in the past. The results indicate that TrueWORM media should have no difficulty lasting the 100 years or so that has been projected in the accelerated aging tests.

Security Problems in Network Management

With the evolution of network management, more responsibility has been placed upon the "framework" to fulfill the TMN FCAPS model. Typical network operations centers, which support Simple Network Management Protocol (SNMP)-based logical and physical devices, must now be capable of supporting all business units in a uniform fashion.

Oops, There It Is: Object-Oriented Project Size Estimation

Java development efforts are sweeping through the enterprise. Existing legacy applications are being reengineered to include Web front-ends. E-business is an idea whose time has come. This article introduces an Object-Oriented Project Size Estimation technique that can help predict the amount of time it takes to design, code and test an object-oriented project.

Enterprise Security: Built on Sound Policies

The creation of an information security policy can be a complex task. Decisions need to be made concerning the degree and type of security that is right for your company, while considering economic factors. Where do you begin?

The Security Behind Secure Extranets

With companies scrambling to gain yardage on the e-business playing field, data security and integrity could mean the difference between a win and a loss. Secure extranets redefine security from a defensive measure to a strategic, offensive move which allows companies to truly enable their online businesses.

SAM Delivers Multiplatform Security

Companies turn to Schumann Security Software's Security Administration Manager to build a repository of "who has access to what."

The Enemies Within: Building a Multi-Layered System Security

Today’s trend toward enterprisewide information sharing has network administrators scrambling to “build a better mousetrap.” This solution presents blueprints for building a seven-layer security system within your own network neighborhood.