Skip Navigation

Scout Archives

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

(4 classifications) (22 resources)

Computer networks -- Security measures

Classification
Evaluation. (1)
Software (2)
Study and teaching (1)
United States (9)

Resources

A Net Meltdown is Inevitable

On October 22, 2002, an attack on the thirteen servers that act as the backbone of the Internet was carried out, briefly disabling nine of them. This drew attention to the often criticized organization that operates these servers, the Internet Corporation for Assigned Names and Numbers (ICANN). This news article argues that bad practices and insufficient safety precautions of ICANN may soon lead...

https://www.zdnet.com/article/a-net-meltdown-is-inevitable/
Architectures for Intrusion Tolerant Database Systems

The Cyber Security Group at Pennsylvania State University is developing database software that can detect "attacks by malicious transactions" and repair the database with no interruption. This research paper proposes five different schemes for implementing such a system, with each one building on the previous. Some of the main goals for the schemes are automatic damage repair, attack isolation to...

https://s2.ist.psu.edu/paper/itdb-archs.pdf
As more information goes online, companies and individuals try to maintain privacy of web searches

Ask.com's privacy "eraser" misses a few spots http://machinist.salon.com/blog/2007/12/11/askeraser/index.html Protests accompany Google's expansion of Street View http://www.iht.com/articles/2007/12/11/technology/street.php Google Maps Street View http://maps.google.com/help/maps/streetview/ Security Bites Podcast http://www.news.com/2030-11424-6052904.html Six Tips to Protect Your...

https://scout.wisc.edu/report/2007/1214
BlackHat Media Archives

This massive archive of presentations is offered for "the world wide computer security community." The archive can be accessed at no cost, and mainly consists of slide presentations from BlackHat conferences and conventions. These events began in 1997 to help professionals assess potential risks and recognize areas most vulnerable to security breaches. The material available in the archive...

https://www.blackhat.com/html/archives.html
Computer Security Resource Center (CSRC): History of Computer Security

This Web site serves as a collection of seminal research papers that "every serious student of computer security should read." Mostly from the 1970's but also stretching into the '80s, the papers were first collectively distributed at the 1998 National Information Systems Security Conference but are now offered online to make them more widely available. Each paper contributed to computer security...

https://csrc.nist.gov/csrc/media/publications/conference-pap...
Cryptographic Toolkit

The Cryptographic Toolkit is being developed by a subgroup of the National Institute of Standards and Technology (NIST), whos members work to implement and promote cryptographic technologies and efficient practices. The purpose of the toolkit is to "enable US Government agencies and others to select cryptographic security components and functionality for protecting their data, communications, and...

https://www.nist.gov/programs-projects/cryptographic-standar...
Databuse: Digital Privacy and the Mosaic

What does privacy mean in a digital age? Is digital privacy even possible? Benjamin Wittes, a senior fellow of governance studies at The Brookings Institution is quite concerned with these questions. This 24-page report on this subject was released in April 2011, and it looks at the nature of what Wittes refers to as "databuse". Wittes argues that when thinking about privacy in a digital age, "we...

https://www.brookings.edu/research/databuse-digital-privacy-...
Digital Forensics and Cyber Security Center at the University of Rhode Island

Based at the University of Rhode Island, the Digital Forensics and Cyber Security Center (DFCSC) "supports state, national, and international public welfare through education, research, training, and service in forensic investigations and securing information systems." The website provides access to news from the fields of digital forensics and cyber security, along with working papers, materials...

https://web.uri.edu/cs/dfcsc/
Distributed Intrusion Detection System

Internet worms and other malicious code often scan firewalls to determine which ports are unprotected. While firewall users have access to their port scanning data in the form of log files, most do not make use of it. The Distributed Intrusion Detection System remotely monitors trends in worldwide port scanning, and the data it has collected is available at this site. The data can be used by...

https://secure.dshield.org/
Electronic Privacy Information Center (Last reviewed in The Scout Report on June 13, 1997)

When the Electronic Privacy Information Center (EPIC) was started in 1994, there were already substantial privacy issues surrounding the collection and use of electronic data at play. Since that time, such issues have grown exponentially in their scope, and EPIC continues to perform valuable research in the area. A good place to start exploring their site is right on the homepage, namely their...

https://epic.org/
Next →