CONTENTS - Emerald
CONTENTS - Emerald
CONTENTS - Emerald
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
041333 `US government board to create \New Security Order" '<br />
W Madsen, Computer Fraud and Security Bulletin (Feb 95) pp 8{9<br />
The author discusses the US Security Policy Board, which was established by President<br />
Clinton to harmonise the classi ed and nonclassi ed approaches to information<br />
protection, and to lay down policy on the e ects of sexual orientation on clearance,<br />
surveillance countermeasures, Tempest, and the training of security personnel. He<br />
claims that it will subordinate NIST to the NSA for this purpose.<br />
041334 `Who's Guarding the Till and the CyberMall?'<br />
L Marion, Datamation (15/2/95) pp 38{41<br />
The author discusses the security concerns of electronic commerce, and contrasts<br />
the EDI and Internet approaches.<br />
041335 `Understanding Backups | A Business Perspective'<br />
JMaynard, Computer Audit Update (Dec 94) pp 15-18<br />
The business goals of backup often get obscured by the technology; many rms<br />
spend most of their e ort backing up multiple copies of applications code rather than<br />
actual business data.<br />
041336 `Secure Unix for Enterprise Computing'<br />
RJ Melford, Datamation (1/3/95) pp 55{58<br />
The author discusses the basics of Unix security.<br />
041337 `The economics of network security'<br />
D Moreley, International Security Review (Winter 94/5) pp 23{26<br />
The author, a general manager at Cylink, describes a number of computer security<br />
products from his own and other companies.<br />
041338 `Development of Security Policies'<br />
J lnes, Computers and Security v 13 no 8 (94) pp 628{636<br />
The author discusses how togoaboutdeveloping an organisational security policy.<br />
041339 `The court's perspective on defective computer systems: lessons<br />
to learn'<br />
RParry, Computer Audit Update (Feb 95) pp 3{6<br />
In a recent case (The Salvage Association v CAP Financial Services Ltd), the court<br />
set aside a clause limiting damages to $25K on the grounds that the defendant had<br />
insurance for $500K while the plainti had no means to insure against the risk.<br />
041340 `The Enigma of Bletchley Park | World War II Codebreaking to<br />
Museums Campus'<br />
AJ Sale, Cirencester 93 pp 73{81<br />
The author gives a brief history of British codebreaking at Bletchley Park during<br />
the second world war, and describes current moves to set up museums of cryptology,<br />
computing, radar and electronics on the site.<br />
041341 `Electronic Monitoring Poses Email Dilemma'<br />
S Saxby, Network Security (Jan 95) pp 17{18<br />
The Privacy Commissioner of Ontario has recommended that rms respect users'<br />
email privacy, and in the USA, Federal guidelines on employee monitoring have been<br />
proposed (but failed to get through Congress). The EU's data protection directive will<br />
have similar e ects. Thus monitoring will increasingly require notice and/or consent.<br />
041342 `How Hackers Do It'<br />
RSchifreen, Network Security (Oct 94) pp 17{19<br />
The author presents a list of thirty nine techniques which hackers have used (or<br />
could use) to defeat network security.<br />
23