15.08.2012 Views

CONTENTS - Emerald

CONTENTS - Emerald

CONTENTS - Emerald

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

041333 `US government board to create \New Security Order" '<br />

W Madsen, Computer Fraud and Security Bulletin (Feb 95) pp 8{9<br />

The author discusses the US Security Policy Board, which was established by President<br />

Clinton to harmonise the classi ed and nonclassi ed approaches to information<br />

protection, and to lay down policy on the e ects of sexual orientation on clearance,<br />

surveillance countermeasures, Tempest, and the training of security personnel. He<br />

claims that it will subordinate NIST to the NSA for this purpose.<br />

041334 `Who's Guarding the Till and the CyberMall?'<br />

L Marion, Datamation (15/2/95) pp 38{41<br />

The author discusses the security concerns of electronic commerce, and contrasts<br />

the EDI and Internet approaches.<br />

041335 `Understanding Backups | A Business Perspective'<br />

JMaynard, Computer Audit Update (Dec 94) pp 15-18<br />

The business goals of backup often get obscured by the technology; many rms<br />

spend most of their e ort backing up multiple copies of applications code rather than<br />

actual business data.<br />

041336 `Secure Unix for Enterprise Computing'<br />

RJ Melford, Datamation (1/3/95) pp 55{58<br />

The author discusses the basics of Unix security.<br />

041337 `The economics of network security'<br />

D Moreley, International Security Review (Winter 94/5) pp 23{26<br />

The author, a general manager at Cylink, describes a number of computer security<br />

products from his own and other companies.<br />

041338 `Development of Security Policies'<br />

J lnes, Computers and Security v 13 no 8 (94) pp 628{636<br />

The author discusses how togoaboutdeveloping an organisational security policy.<br />

041339 `The court's perspective on defective computer systems: lessons<br />

to learn'<br />

RParry, Computer Audit Update (Feb 95) pp 3{6<br />

In a recent case (The Salvage Association v CAP Financial Services Ltd), the court<br />

set aside a clause limiting damages to $25K on the grounds that the defendant had<br />

insurance for $500K while the plainti had no means to insure against the risk.<br />

041340 `The Enigma of Bletchley Park | World War II Codebreaking to<br />

Museums Campus'<br />

AJ Sale, Cirencester 93 pp 73{81<br />

The author gives a brief history of British codebreaking at Bletchley Park during<br />

the second world war, and describes current moves to set up museums of cryptology,<br />

computing, radar and electronics on the site.<br />

041341 `Electronic Monitoring Poses Email Dilemma'<br />

S Saxby, Network Security (Jan 95) pp 17{18<br />

The Privacy Commissioner of Ontario has recommended that rms respect users'<br />

email privacy, and in the USA, Federal guidelines on employee monitoring have been<br />

proposed (but failed to get through Congress). The EU's data protection directive will<br />

have similar e ects. Thus monitoring will increasingly require notice and/or consent.<br />

041342 `How Hackers Do It'<br />

RSchifreen, Network Security (Oct 94) pp 17{19<br />

The author presents a list of thirty nine techniques which hackers have used (or<br />

could use) to defeat network security.<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!