Information Security Articles
The following is a list of infomation security articles written by Scott Barman.

Creating an Information Policy
published November 16, 2001 at InformIT.com
This article is excerpted from Writing Information Security Policies
  Hardly a week passes without hearing about a new virus, worm, or Trojan Horse that infects networks of computers. These problems not only cost the company money in their aftermath, but there is a loss of productivity that can never be replaced. Although these problems primarily hit the operating system and software of one vendor, no operating system is safe. Remember, the first publicized worm was unleashed in 1988 and was designed to attack Digital VAX and Sun Systems based on a version of UNIX.    more...
 
Upgrading Software Development Security
published April 5, 2002 at InformIT.com
  I recently received a warning, reporting that a popular program has yet another security problem because of a buffer overflow. I had to laugh, thinking back to Microsoft CEO Steve Ballmer’s retort, “You would think we could figure out how to fix buffer overflows by now.”    more...
 
Writing Mobile Code Policies
published April 5, 2002 at InformIT.com
  It started with a simple idea: Allow the user to download a small piece of software that would enhance his or her online experience. Programmers could use this software to customize pages, do data validation on forms, and perform some basic processing, removing these burdens from the server. When Sun released their Java language and Java Virtual Machine (JVM) environment, the possibilities became endless. Sun’s JVM was supposed to revolutionize Internet programming. A developer would write one program that could run anywhere the JVM was available. With the JVM available in most popular browsers, the concept of mobile code was born. Mobile code is defined as small pieces of software automatically downloaded into the user’s workstation and executed without the user’s initiation or knowledge.    more...


Writing Information Security Policy’s Home Page...
Scott’s Home Page...

All questions, comments, and corrections may be e-mailed to the author Last update: October 09, 2011