Categories: "Analysis"

About the Analysis category

  03:20, by Hagai Bar-El   , 48 words
Categories: Analysis

The Analysis category contains articles that discuss security analysis of requirements and analysis of solutions. This category is further divided into sub-categories that address cybersecurity (critical infrastructure and homeland security), IT security (deployment of IT security tools and operations), security engineering (the development of security tools), and policy.

Pages: 1 2 3 4 5 6 ...7 ...8 9 11 12

  2006-07-28

The toughest part of designing secure products

  21:37, by Hagai Bar-El   , 928 words
Categories: Security Engineering
It is already obvious that security is hard to do right. Bruce Schneier has written a good essay called: Why Cryptography Is Harder Than It Looks. This essay refers to cryptography, but touches on the subject as a whole. It is still not always clear,… more »

  2006-05-07

Is E-mail encryption really too complex?

  21:32, by Hagai Bar-El   , 567 words
Categories: IT Security
Every once in a while we read yet another article revealing the level to which e-mail encryption is uncommon. The last one I saw is here. Whenever the debate is raised about how come e-mail encryption is so seldom used, we hear the common opinion that… more »

  2005-11-12

Evaluating Commercial Counter-Forensic Tools

  21:30, by Hagai Bar-El   , 548 words
Categories: IT Security, Sources
I have just enjoyed reading "Evaluating Commercial Counter-Forensic Tools" by Matthew Geiger from Carnegie Mellon University. The paper presents failures in commercially-available applications that offer covering the user's tracks. These applications… more »

  2005-10-24

Anonymity -- great technology but hardly used

  21:27, by Hagai Bar-El   , 581 words
Categories: IT Security
It's hard not to appreciate the long way we did in studying anonymity and pseudonymity. We know a lot and can do a lot. Each time I read on a zero-knowledge scheme or on another untraceable digital cash I am amazed by the amount of knowledge that the… more »

  2005-06-21

Today's Credit Card Fraud Prevention -- Throwing The Baby With The Bathwater?

  21:24, by Hagai Bar-El   , 596 words
Categories: Security Policies
E-commerce and credit cards in particular are always considered to have succeeded in overcoming the big problem of fraud. All too often when a new security mechanism is presented to combat credit card fraud its opponents claim that fraud in credit card… more »

  2005-06-04

Trojan-Horse Espionage in Israel -- A Tip of an Iceberg

  21:22, by Hagai Bar-El   , 661 words
Categories: IT Security
About one week ago, a serious commercial espionage system was discovered in Israel. For years, several large-scale companies in Israel enjoyed inside information about their competitors using private investigators who were using a Trojan horse… more »

  2005-05-14

Watermarking for DRM? Maybe one day

  21:16, by Hagai Bar-El   , 228 words
Categories: Security Engineering
One of the biggest hurdles of DRM results is that content can somehow be leaked by a few skilled individuals and then find itself on the peer-to-peer networks again. The only way to mitigate this threat is by embedding a watermark on the plain content d… more »

1 2 3 4 5 6 ...7 ...8 9 11 12