Categories: "Analysis"

About the Analysis category

  03:20, by Hagai Bar-El   , 48 words
Categories: Analysis

The Analysis category contains articles that discuss security analysis of requirements and analysis of solutions. This category is further divided into sub-categories that address cybersecurity (critical infrastructure and homeland security), IT security (deployment of IT security tools and operations), security engineering (the development of security tools), and policy.

Pages: 1 2 3 4 ...5 ... 7 ...9 ...10 11 12

  2011-01-28

Cyber-war Risk Exaggerated?

  23:02, by Hagai Bar-El   , 700 words
Categories: Security Policies, Cyber Security, Counter-media
A ZDNet article, Cyber-war risk is exaggerated, says OECD study, points to what seems as a thorough study that concluded with the stated result. I never read this study, but from the article one can point one point in which it is probably right and one… more »

  2011-01-08

Car Automation. Me? Worried?

  22:48, by Hagai Bar-El   , 732 words
Categories: Security Engineering
Cars will soon be (almost) fully automated. News on experiments with cars that drive by themselves, in different scenarios and situations, make it seem obvious that soon enough the role of the driver is to be similar to that of a pilot in a passenger je… more »

  2010-12-18

The Effect of Wikileaks

  22:47, by Hagai Bar-El   , 689 words
Categories: IT Security
Wikileaks did evil. It published stuff that should not have been published. Julian Assange acted carelessly, I think. Still, the impact of Wikileaks is not what we usually think it is. The security of citizens was not affected by Wikileaks, but by the… more »

  2010-11-16

Overcoming Distrust in CAs Using External Quality Enforcement

  22:46, by Hagai Bar-El   , 790 words
Categories: IT Security
A few weeks ago, I wrote about the inherent limitations of the certification model. This model cannot be expected to provide a solution to the binding of entities to public keys, primarily because Certification Authorities (CAs) have no financial… more »

  2010-10-28

Preventing the Evil Maid Attack on FDE

  22:33, by Hagai Bar-El   , 467 words
Categories: IT Security
The attack referred to as the ”Evil Maid Attack”, or the “Cleaning Maid Attack” against full disk encryption (FDE), is considered as one of the serious attacks concerning people who travel with laptops full of confidential information. This attack… more »

  2010-10-22

The Inevitable Collapse of the Certificate Model

  22:30, by Hagai Bar-El   , 755 words
Categories: IT Security, Counter-media
Many had high expectations from the SSL/TLS certificate model. At least on paper it sounded promising and worthwhile. Keys are used to protect traffic; for this to be effective, keys shall be bound to business entities; for the binding to be trustworthy… more »

  2010-08-24

Understanding the security risk of SaaS

  22:29, by Hagai Bar-El   , 745 words
Categories: IT Security, Counter-media
Software as a Service (SaaS) is one of the hot trends in Information Technologies. “SaaS” is the name given to the concept of having applications run on the infrastructure of the service provider, rendering service to the customer over the net. The… more »

1 2 3 4 ...5 ... 7 ...9 ...10 11 12