Sunday, January 25, 2004

http://www.networkcomputing.com/913/913r1.html
IP-Based Security Auditing Tools By Greg Shipley
This article located at the network computing site writes up the results of a review of four security scanners, and the editor's choice. I am placing this article on the blog as I liked the writing and that it used the buzz words of our field. To me, having students read an article like this (or even peruse this website), illustrates the validity of the advice I give to students. They need to stay current with the lingo.

Saturday, January 03, 2004

http://www.optimizemag.com/issue/024/security.htm
Espionage: A Real Threat By Minh Luong October 2003, Optimize, Issue 24
Are corporations doing enough to protect themselves from espionage? Some of the informative discussion in this article is a listing of industries most at risk, noting the likely economic espionage "leaks", and a human factor checklist related to various levels of computer staff.