+ Follow COMPUTER EMERGENCY RESPONSE TEAM Tag
Array
(
[results] => Array
(
[0] => Array
(
[ArticleID] => 156151
[Title] => With security, you get what you pay for
[Summary] => When it comes to security, you get what you pay for. Most consumers wont purchase a $50 electronic device without looking for an Underwriters Laboratory sticker, yet they purchase software at a thousand times the price that they use for running their enterprises, with no consideration of product security mechanisms.
Everyone wants to use the Internet to securely connect partners and customers directly to their systems, but in this environment, its not just the technical security measures that are important, its the confidence you can place in those measures.
[DatePublished] => 2002-04-05 00:00:00
[ColumnID] => 133272
[Focus] => 0
[AuthorID] => 1503547
[AuthorName] => Mary Ann Davidson
[SectionName] => Technology
[SectionUrl] => technology
[URL] =>
)
[1] => Array
(
[ArticleID] => 153124
[Title] => Network Security: the new challenge
[Summary] => With over 40,000 sites on the World Wide Web containing some form of "hacker tools," the ranks of hobbyist hackers and writers of computer viruses are expected to grow exponentially.
Just about any sufficiently motivated information technology novice can trash the stock exchange website or redirect it to a porn site. Just about anyone with basic programming skills and an unhealthy sense of adventure can unleash another ILOVEYOU virus and destroy stored data anywhere in the world.
[DatePublished] => 2002-03-08 00:00:00
[ColumnID] => 133272
[Focus] => 0
[AuthorID] => 1212707
[AuthorName] => Carla Paras-Sison
[SectionName] => Technology
[SectionUrl] => technology
[URL] =>
)
)
)
COMPUTER EMERGENCY RESPONSE TEAM
Array
(
[results] => Array
(
[0] => Array
(
[ArticleID] => 156151
[Title] => With security, you get what you pay for
[Summary] => When it comes to security, you get what you pay for. Most consumers wont purchase a $50 electronic device without looking for an Underwriters Laboratory sticker, yet they purchase software at a thousand times the price that they use for running their enterprises, with no consideration of product security mechanisms.
Everyone wants to use the Internet to securely connect partners and customers directly to their systems, but in this environment, its not just the technical security measures that are important, its the confidence you can place in those measures.
[DatePublished] => 2002-04-05 00:00:00
[ColumnID] => 133272
[Focus] => 0
[AuthorID] => 1503547
[AuthorName] => Mary Ann Davidson
[SectionName] => Technology
[SectionUrl] => technology
[URL] =>
)
[1] => Array
(
[ArticleID] => 153124
[Title] => Network Security: the new challenge
[Summary] => With over 40,000 sites on the World Wide Web containing some form of "hacker tools," the ranks of hobbyist hackers and writers of computer viruses are expected to grow exponentially.
Just about any sufficiently motivated information technology novice can trash the stock exchange website or redirect it to a porn site. Just about anyone with basic programming skills and an unhealthy sense of adventure can unleash another ILOVEYOU virus and destroy stored data anywhere in the world.
[DatePublished] => 2002-03-08 00:00:00
[ColumnID] => 133272
[Focus] => 0
[AuthorID] => 1212707
[AuthorName] => Carla Paras-Sison
[SectionName] => Technology
[SectionUrl] => technology
[URL] =>
)
)
)
abtest