Quantcast
Channel: Computer Science Articles - Inquiries Journal
Browsing all 18 articles
Browse latest View live

A Brief History of Cryptography

By Tony M. Damico - As early as 1900 B.C., Egyptian scribes used hieroglyphs in a non-standard fashion, presumably to hide the meaning from those who did not know the meaning (Whitman, 2005). The...

View Article



A Vulnerable Network: Undersea Internet Cable Attacks

By Tony M. Damico - Conversely, one could argue that with more cables being laid, some redundancy will occur so that the increased number of undersea cables will ensure greater continuity in times of...

View Article

Cyber Attack Prevention for the Home User: How to Prevent a Cyber Attack

By Tony M. Damico - Consider the difference between network intrusion prevention and network detection systems. Prevention systems “automatically detect and block malicious network and application...

View Article

Enterprise Communication in Brief: Securing Enterprise Commnication

By Tony M. Damico - In today’s world of instant information transfer and with the incredible pace of technological developments that occur daily, protecting a company’s data and information is becoming...

View Article

Distributed Trust Based Management: Who's Getting In?

By Tony M. Damico - As in the case of a national accounting firm that handles accounts related to a wide variety of industries and company size, there would be multiple offices across a wide...

View Article


Cracking the Digital Vault: A Study of Cyber Espionage

By Constantine J. Petallides - The Internet originated with research funding provided by the Department of Defense Advanced Research Projects Agency (DARPA) to establish a military network. As its use...

View Article

A Brief History of Cryptography

By Tony M. Damico - As early as 1900 B.C., Egyptian scribes used hieroglyphs in a non-standard fashion, presumably to hide the meaning from those who did not know the meaning (Whitman, 2005). The...

View Article

A Vulnerable Network: Undersea Internet Cable Attacks

By Tony M. Damico - Conversely, one could argue that with more cables being laid, some redundancy will occur so that the increased number of undersea cables will ensure greater continuity in times of...

View Article


Cyber Attack Prevention for the Home User: How to Prevent a Cyber Attack

By Tony M. Damico - Consider the difference between network intrusion prevention and network detection systems. Prevention systems “automatically detect and block malicious network and application...

View Article


Distributed Trust Based Management: Who's Getting In?

By Tony M. Damico - As in the case of a national accounting firm that handles accounts related to a wide variety of industries and company size, there would be multiple offices across a wide...

View Article

Cracking the Digital Vault: A Study of Cyber Espionage

By Constantine J. Petallides - The Internet originated with research funding provided by the Department of Defense Advanced Research Projects Agency (DARPA) to establish a military network. As its use...

View Article

Defending the Cyber Realm

By Alex Middleton - There is a widespread belief that as societies and governments become increasingly reliant upon information technology, they in turn are becoming more vulnerable to a whole range of...

View Article

An Overview of Essential Security Measures for Competitive Organizations

By Teodor Topalov Et. Al. - In today’s world whether an organization has a small network managed and controlled by a small team of individuals or has multiple large databases and mainframes managed by...

View Article


Internet Freedom: Rhetoric Versus Reality

By Vaughan A. Holding - In the last few years the Internet has borne witness to and facilitated a great deal of social and societal change. From Hilary Clinton's positive 2010 address; ‘Remarks on...

View Article

The Internet as a Slippery Object of State Security: The Problem of Physical...

By Memphis Krickeberg - Cybersecurity is presented in the growing literature on the subject as an essentially "slippery" object for state security.1 The Internet puts a lot of stress on the...

View Article


Stuxnet: The World's First Cyber... Boomerang?

By Alex Middleton - In June 2012, two years after the initial discovery of the Stuxnet worm,1 an excerpt from David Sanger's then soon to be released book entitled Confront and Conceal was published in...

View Article

Crossed Wires: International Cooperation on Cyber Security

By Madeline Carr - Although cyber security is quite clearly a ‘post-state' problem, it has actually proven very difficult to move beyond a Westphalian conception of either the problem or the possible...

View Article


A Brief History of Cryptography

By Tony M. Damico - As early as 1900 B.C., Egyptian scribes used hieroglyphs in a non-standard fashion, presumably to hide the meaning from those who did not know the meaning (Whitman, 2005). The...

View Article
Browsing all 18 articles
Browse latest View live




Latest Images