Zobrazeno 1 - 10
of 49
pro vyhledávání: '"Ralph Spencer Poore"'
Autor:
Ralph Spencer Poore
Publikováno v:
EDPACS. 33:1-8
Before describing information security governance, we need at least an overview of corporate governance as a context. Fundamentally, corporate governance concerns the means by which managers are held accountable to stakeholders (e.g., investors, empl
Autor:
Ralph Spencer Poore
Publikováno v:
EDPACS. 32:7-16
In the information age where teleconferences replace in-person meetings, telecommuting replaces going to the office, and international networks facilitate global transmissions with the apparent ease of calling your next-door neighbor, valuable assets
Autor:
Ralph Spencer Poore
Publikováno v:
Information Systems Security. 12:6-11
Future cryptosystems — at least those that survive rigorous vetting — will have long lives. However, not all implementations of these cryptosystems will. Existing cryptosystems may have long lives; most existing implementations, however, will not
Autor:
Ralph Spencer Poore
Publikováno v:
Information Systems Security. 11:10-14
According to Lance Spitzner in his book Honeypots: Tracking Hackers!,1 a honeypot is “a security resource [whose] value lies in being probed, attacked or compromised.”2 Thus, whether for research or production,3 an organization uses a honeypot as
Autor:
Ralph Spencer Poore
Publikováno v:
Information Systems Security. 11:4-9
Ready or not, wireless devices have come of age. While not as mature adults, these devices that connect through cellular, radio frequency, infrared, spread spectrum, or other ethereal magic (Arthur C. Clark: “Technology, sufficiently advanced, is i
Autor:
Ralph Spencer Poore
Publikováno v:
Information Systems Security. 10:1-5
At DEFCON-9 the FBI arrested Dimitry Sklyarov following his presentation on eBook security, for developing and distributing a tool designed to circumvent the electronic copyright protection associated with Adobe's eBooks. This made Sklyarov the first
Autor:
Ralph Spencer Poore
Publikováno v:
Information Systems Security. 10:1-8
In our society today, conducting business anonymously verges on the Herculean or even Sisyphean.1 If a transaction is not barter or cash, keeping the buyer anonymous poses challenges even without the additional elements inherent in electronic commerc
Autor:
Ralph Spencer Poore
Publikováno v:
Information Systems Security. 10:1-6
When farmer Jones walked into the general store in town, the storeowner — or one of his employees — would greet him personally. The storeowner knew whether farmer Jones' credit was good, what his buying habits were, and how he would settle his ac
Autor:
Ralph Spencer Poore
Publikováno v:
Information Systems Security. 10:1-6
Avalanche! With new information doubling every five years (soon to be every two and a half years!), the information security professional may find herself buried in an information avalanche. Where a new security standard in the financial services are
Autor:
Ralph Spencer Poore
Publikováno v:
Information Systems Security. 9:1-6
How do you prove that your information was copied when you find an instance of what appears to be your data? If a large enough sample exists identical to your original, you infer that the sample represents a copy. A strong statistical argument analog