Feature

SearchSecurity.com highlights November 2006

 

Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the magazine, explore this month's topics further on SearchSecurity.com.


Thwart hacking techniques
This month's issue of Information Security examines steganography, which is a method of hiding messages within a host file. If you're an enterprise security manager, it would be wise to familiarize yourself with the techniques hackers and insiders are using to steal data in plain view. This learning guide on the latest hacker techniques gives you a head start on malicious users.
>> Review our Thwarting Hacker Techniques Learning Guide.

Conduct a risk analysis
A well-crafted business impact analysis can be the difference between a minor outage and major trouble. This installment of SearchSecurity.com's Risk Management Guide helps you identify asset value, vulnerabilities and threats to those assets, quantify the business impact posed by threats, and set goals for your risk analysis.
>> Read How to conduct a risk analysis

Deal with switches and segments
You know your copper-wire networks can be hacked, but fiber is crack-proof, right? Think again. There are tools readily available on the Internet that can expose network to outsiders. If you want to read more about fiber taps, check out this technical tip.
>> Read How to deal with switches and segments

PING with Aviel Rubin
In this exclusive interview with Information Security magazine, Aviel Rubin, author of Brave New Ballot, examines security problems in e-voting machines, and explains why isn't just a cause for concern, it's a matter of national security.
>> Read the interview with Aviel Rubin





HIGHLIGHTS ARCHIVES
October 2006 September 2006 August 2006 July 2006 June 2006 May 2006
April 2006 March 2006 February 2006 January 2006 December 2005 November 2005
October 2005 September 2005 August 2005 July 2005 June 2005 May 2005


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in November 2006

 

COMMENTS powered by Disqus  //  Commenting policy