A Brief History of Cryptography
By Tony M. Damico - As early as 1900 B.C., Egyptian scribes used hieroglyphs in a non-standard fashion, presumably to hide the meaning from those who did not know the meaning (Whitman, 2005). The...
View ArticleA Vulnerable Network: Undersea Internet Cable Attacks
By Tony M. Damico - Conversely, one could argue that with more cables being laid, some redundancy will occur so that the increased number of undersea cables will ensure greater continuity in times of...
View ArticleCyber Attack Prevention for the Home User: How to Prevent a Cyber Attack
By Tony M. Damico - Consider the difference between network intrusion prevention and network detection systems. Prevention systems “automatically detect and block malicious network and application...
View ArticleEnterprise Communication in Brief: Securing Enterprise Commnication
By Tony M. Damico - In today’s world of instant information transfer and with the incredible pace of technological developments that occur daily, protecting a company’s data and information is becoming...
View ArticleDistributed Trust Based Management: Who's Getting In?
By Tony M. Damico - As in the case of a national accounting firm that handles accounts related to a wide variety of industries and company size, there would be multiple offices across a wide...
View ArticleCracking the Digital Vault: A Study of Cyber Espionage
By Constantine J. Petallides - The Internet originated with research funding provided by the Department of Defense Advanced Research Projects Agency (DARPA) to establish a military network. As its use...
View ArticleA Brief History of Cryptography
By Tony M. Damico - As early as 1900 B.C., Egyptian scribes used hieroglyphs in a non-standard fashion, presumably to hide the meaning from those who did not know the meaning (Whitman, 2005). The...
View ArticleA Vulnerable Network: Undersea Internet Cable Attacks
By Tony M. Damico - Conversely, one could argue that with more cables being laid, some redundancy will occur so that the increased number of undersea cables will ensure greater continuity in times of...
View ArticleCyber Attack Prevention for the Home User: How to Prevent a Cyber Attack
By Tony M. Damico - Consider the difference between network intrusion prevention and network detection systems. Prevention systems “automatically detect and block malicious network and application...
View ArticleDistributed Trust Based Management: Who's Getting In?
By Tony M. Damico - As in the case of a national accounting firm that handles accounts related to a wide variety of industries and company size, there would be multiple offices across a wide...
View ArticleCracking the Digital Vault: A Study of Cyber Espionage
By Constantine J. Petallides - The Internet originated with research funding provided by the Department of Defense Advanced Research Projects Agency (DARPA) to establish a military network. As its use...
View ArticleDefending the Cyber Realm
By Alex Middleton - There is a widespread belief that as societies and governments become increasingly reliant upon information technology, they in turn are becoming more vulnerable to a whole range of...
View ArticleAn Overview of Essential Security Measures for Competitive Organizations
By Teodor Topalov Et. Al. - In today’s world whether an organization has a small network managed and controlled by a small team of individuals or has multiple large databases and mainframes managed by...
View ArticleInternet Freedom: Rhetoric Versus Reality
By Vaughan A. Holding - In the last few years the Internet has borne witness to and facilitated a great deal of social and societal change. From Hilary Clinton's positive 2010 address; ‘Remarks on...
View ArticleThe Internet as a Slippery Object of State Security: The Problem of Physical...
By Memphis Krickeberg - Cybersecurity is presented in the growing literature on the subject as an essentially "slippery" object for state security.1 The Internet puts a lot of stress on the...
View ArticleStuxnet: The World's First Cyber... Boomerang?
By Alex Middleton - In June 2012, two years after the initial discovery of the Stuxnet worm,1 an excerpt from David Sanger's then soon to be released book entitled Confront and Conceal was published in...
View ArticleCrossed Wires: International Cooperation on Cyber Security
By Madeline Carr - Although cyber security is quite clearly a ‘post-state' problem, it has actually proven very difficult to move beyond a Westphalian conception of either the problem or the possible...
View ArticleA Brief History of Cryptography
By Tony M. Damico - As early as 1900 B.C., Egyptian scribes used hieroglyphs in a non-standard fashion, presumably to hide the meaning from those who did not know the meaning (Whitman, 2005). The...
View Article
More Pages to Explore .....