by scott | Nov 12, 2002 | Information Security Articles
CISSP Training Guide, Chapter 3, contributed by Scott Barman This sample chapter covers Domain 3, Security Management Practices, 1 of 10 domains of the Common Body of Knowledge (CBK) covered in the Certified Information Systems Security Professional Examination. NOTE:...
by scott | Oct 15, 2001 | Information Security Articles
Originally published April 5, 2002 at InformIT.com It started with a simple idea: Allow the user to download a small piece of software that would enhance his or her online experience. Programmers could use this software to customize pages, do data validation on forms,...
by scott | Oct 15, 2001 | Information Security Articles
published November 16, 2001 at InformIT.com This article is excerpted from Writing Information Security Policies by Scott Barman Hardly a week passes without hearing about a new virus, worm, or Trojan Horse that infects networks of computers. These problems not only...
by scott | Oct 15, 2001 | Information Security Articles
Originally published April 5, 2002 at InformIT.com I recently received a warning, reporting that a popular program has yet another security problem because of a buffer overflow. I had to laugh, thinking back to Microsoft CEO Steve Ballmer’s retort, “You...