The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the 21st century progresses, computer systems have become a target for a new type of criminal who attacks software with malicious intent. Failure Modes and Effects Analysis, which is normally used to improve system reliability by identifying and mitigating the effects of potential system failures, provides a basic framework that can be applied to counter the threats a computer system will encounter...
Each August, more than 4,000 IT administrators, industry experts, government officials, and hackers gather at a convention in Las Vegas. The Black Hat Briefings (www.blackhat.com), as that conference is known, started out many years ago as a hacker's convention, but it has evolved into the premier venue for technical information on cybersecurity and the latest security research.
The recognition that we need improved computer security education has increased over the past several years. Recent cyberattacks in Georgia and Estonia exemplify the new threats faced by economies that rely on the Internet. Thus, more people see the need to protect cyberspace-which translates into improving computer security in all aspects of computer use-as crucial for everyone, not merely for those...
The principle and development of bio-inspired computer immune system are surveyed. A computer network immune system model intending to remove the three hidden perils of computer security (intrusion, virus, abnormity) - LAN immune system model based on host (LISMH) is presented. The workflow of virus detection and removal in LISMH are emphasized and its strongpoint comparing to other computer immune...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.