LSC 555 Information Systems Webliography: Network Security
by
April Perlowski
| Security Issues
| Methods of Protection
| Security Technology
- Security Issues
- Facts for Consumers
by the Federal Trade Commission
A detailed description of how identity theft takes place and how the consumer
can protect his or her self.
The section labled, Consider Your Computer, explains how the reader can safeguard their computer against identity theft.
While the paper is not aimed soley at network security, it is useful knowledge to have.
- Security Pitfalls in Cryptography
by Bruce Schneier
(You have to click on "click here" to download the white paper once you get to the website.)
This article explores some fallacies of common beliefs about crptography. It emphasizes the concept of attack prevention vs. attack detection.
Unfortunately, at the end of the informational article is a blatent commercial for the company that produced the article.
-
The Complete Windows Trojans Paper
by Dancho Danchev
The paper gives a general description of what Trojans are, how they work, and how users can minimize the risk of detection.
The author of the paper has some grammar issues and assumes that the reader has a certain level of knowledge.
- How Computer Viruses Work
by Marshall Brian
Located on the HowStuuffWorks website, this is an easy to understand introduction to computer viruses and what they do.
The site gives brief informative synopsis of different types of viruses, including viruses that have appeared in the headlines for the past few years.
The site does not go into explicit detail.
- Home Network Security
by Cert Coordination Center
This article focuses on security issues aimed at mostly cable modem and DSL connections.
The article has a detailed index that allows the reader to go directly to the area that interests him or her.
Some of the topics covered are: What is computer security, the technology, security risks to home users, and what users can do to protect their systems.
One downfall of this article is that after reading it, the reader may think that there is no safe way to use a computer.
-
What Hackers Don't Want You to Know About Securing Your Wireless Lan
by AirMagnet
To access the full article follow the instructions at the bottom of the eBCVG website.
This article discusses how to secure a wireless network and how hackers attack them. The article spends too much time and space dissecting the hacker community in a derisive manner for my tastes.
- Methods of Protection
- Testimony of Larry Clinton
COO Internet Security Alliance
before the Subcommittee on Technology, information Policy, Intergovernmental Relations and the Census
Government Reform Committee U.S. House of Representatives Hearing on Protecting Our Nation's Cyber Space: Educational Awareness for the Cyber Citizen April 21, 2004
Clinton discusses why and how the Common Sense Guide to Cyber Security for small businesses was developed. I consider this a preface to the next article.
-
Common Sense Guide to Cyber Security for Small Businesses
by Carol Woody and Larry Clinton
This document is aimed at small businesses that have more than one computer but do not have an in-house IT department. The document explains why network security is important, presents a "This can happen to you" section, and then gives step by step instructions on how to protect a network.
The ISAlliance has also created a document for the home user.
- Securing Your Web Server
by Chuck Musciano
This is the 1st of three articles devoted to securing your web server. This document focuses on security basics, how httpd handles server security,
configuring the access.conf file, and managing multiple directories. It does a fine job explaing why many machines do not have a properly configured IP address
One downfall of this article is that it needs the other two articles to become whole.
-
honeypots-Definitions and Value of Honeypots
by Lance Spritzer
This article discusses what Honeypots are and their value as diagnostic and data-collecting tools.
The article gives good information in the whys and hows and backs up his work with research. He also includes examples of commercial Honeypots that are available.
-
Email Compliance: Security Solutions for Regulatory Requirements
by Kevin Beaver
This site discusses some of the U.S. laws affecting email security such as Hippa, GLBA, and the U.S.A. Patriot Act. The article then discusses the service that Singlefin can supply to help keep
businesses compliant with these and other laws. The article becomes a commercial for Singlefin and is sponsered by Singlefin.
- Security Technology
- Big Picture Security
by Paul F. Roberts, IDG News Service
This article discusses SEMS/SIMS (Security Event Management/Security Incident Management) Technology.
After describing what a SEMS does, the article mentions some specific, commercially available SEMS.
- Top 75 Security Tools
by Fyodor
Fyodor is the creator of NMAP. This document is just what it says: a list of the top 75 security tools available.
Since the list was gained from polling NMAP users, NMAP is not listed. Because the NMAP community is comprised of mainly hackers,
the list may be slanted towards attack tools instead of defensive ones. Very good information to know.
-
Whitehats Open Source Security Tools Database
by Whitehats
Whitehats offers links to information about many of the open sourse security tools available and then a direct link to the product.
The tools are divided by chore. The information is not very indepth.
- Anti Virus Vendors
by CERT
This document by CERT lists anti-virus vendors and supplies links to their websites and information about the products and available upgrades.
The list is just a list. Cert does not evaluate the vendors or their products.
©April Perlowski 2004