- After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks
- Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five years
- An intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and industry network needs
- Discusses software that automatically applies security technologies when it recognizes suspicious activities, as opposed to people having to trigger the deployment of those same security technologies
THESE PAGES SUMMARIZE FIVE YEARS OF EXTENSIVE RESEARCH.
Traditional information security methods are no longer adequate to protect critical infrastructures. The Department of Defense has funded extensive university research into enhanced security methods and technology, and this book highlights some of the most significant findings of this program. These articles and analyses offer high-value, leading-edge techniques and solutions for the future of information security.
Learn to build in "smart" security at every level of a network, from individual computer components to the highest echelons of network control
Use guarding techniques that allow individual components to recognize when their own behaviors are degrading and automatically shut down
Apply improved analysis methods to validate code more extensively
Discover new approaches to creating and using mobile code that's harder to break
Create a Java environment that makes bogus code easier to detect and block
Explore software that can automatically recognize suspicious sequences and apply key security policies