This article can also be found in the Premium Editorial Download "Information Security magazine: Reflections on the impact of Sarbanes-Oxley."
Download it now to read this article plus other related content.
Criminals are organized and international. The Internet changed their economic model as well. Physical access is no longer needed to steal; a hacker is as likely to attack from a living room in Beijing as he is from a data center in Silicon Valley. Web sites are no longer defaced for fun, denial-of-service attacks no longer carried out for notoriety. Instead, hackers blackmail high-traffic, big-money sites with DDoS attacks; money is laundered over the Net, secrets stolen and business models put in jeopardy.
|News of the Day|
Information Security rolled off the presses in December 1997. Here's a capsule look at what was in the first issue.
Cover story Information Security's first order of business in December 1997 was to recap the incidents and happenings of the year. As the introduction to the article says, "these highlights may help organizations prepare for the new year."
Inside The meat of the issue tackled the pesky practice of doing business on the Internet, a phenomenon that was gaining steam. Internet risk and liability--two topics still piquing interest 10 years later--were featured topics in a story titled "Paying for Peace of Mind."
| Writers Lorelie Masters and David Valdez examined how insurance companies were starting to provide policies that offset the risk of doing business online.
Also Two stories rounded out the first issue of Information Security.
Products Talk about a blast from the past. If you think today's security marketplace, which numbers close to 800 vendors, is a land of confusion, take a look at the offerings from 1997. CryptoCard's ST-1 Soft Token, a one-time password system for Java authentication, got top billing as a featured product. Some of the other featured products included:
- "What's Brewing with Java and ActiveX" examined the computing potential--and downsides--of these programming techniques and whether they had a future.
- "Security from the Outside In" tackled a subject that resonates today: the convergence of logical and physical security. In particular, this article looked at "entrance controls" and how CCTV monitoring, employee badges and company doors and locks should be combined with security policies and technologies.
ValiCert's ValiCert Suite Digital certificate authority software
WheelGroup's NetSonar Vulnerability scanner
V-One's Multi-Access VPN Virtual private network connections
CyberSafe Corp.'s TrustBroker Security Suite Authentication system for Unix, Windows NT and MVS
Biometric Access' SecureTouch Fingerprint authentication
Sonic Systems' Interpol Web and newsgroup content filter
Checkprogram Software Antivirus software
AT&T's WorldNet VPN VPN service for AT&T customers
This was first published in January 2008