Pages: 1 ... 4 5 6 7 8 9 ...10 ...11 12 14 15

  2007-01-06

Is more security always better?

  By Hagai Bar-El   , 932 words
Categories: Security Policies
This depends on who you ask. Some people think that the more secure a system is, the better; with no exceptions. This school of thought is often attributed to product vendors. This approach helps them believe (and thus convince) that their product is a… more »

  2006-09-11

PDAs in highly classified environments

  By Hagai Bar-El   , 820 words
Categories: IT Security
For a while IT security professionals are warning against the impacts of Personal Digital Assistants (PDAs) on corporate security. A PDA can be lost or stolen and lead to undesired disclosure of the information that is on it. The emerging of… more »

  2006-07-28

The toughest part of designing secure products

  By Hagai Bar-El   , 928 words
Categories: Security Engineering
It is already obvious that security is hard to do right. Bruce Schneier has written a good essay called: Why Cryptography Is Harder Than It Looks. This essay refers to cryptography, but touches on the subject as a whole. It is still not always clear,… more »

  2006-05-07

Is E-mail encryption really too complex?

  By Hagai Bar-El   , 567 words
Categories: IT Security
Every once in a while we read yet another article revealing the level to which e-mail encryption is uncommon. The last one I saw is here. Whenever the debate is raised about how come e-mail encryption is so seldom used, we hear the common opinion that… more »

  2005-11-12

Evaluating Commercial Counter-Forensic Tools

  By Hagai Bar-El   , 548 words
Categories: IT Security, Sources
I have just enjoyed reading "Evaluating Commercial Counter-Forensic Tools" by Matthew Geiger from Carnegie Mellon University. The paper presents failures in commercially-available applications that offer covering the user's tracks. These applications… more »

  2005-10-24

Anonymity -- great technology but hardly used

  By Hagai Bar-El   , 581 words
Categories: IT Security
It's hard not to appreciate the long way we did in studying anonymity and pseudonymity. We know a lot and can do a lot. Each time I read on a zero-knowledge scheme or on another untraceable digital cash I am amazed by the amount of knowledge that the… more »

  2005-06-21

Today's Credit Card Fraud Prevention -- Throwing The Baby With The Bathwater?

  By Hagai Bar-El   , 596 words
Categories: Security Policies
E-commerce and credit cards in particular are always considered to have succeeded in overcoming the big problem of fraud. All too often when a new security mechanism is presented to combat credit card fraud its opponents claim that fraud in credit card… more »

1 ... 4 5 6 7 8 9 ...10 ...11 12 14 15

Search

  XML Feeds

License

All contents licensed under the Creative Commons Attribution license.