By Topic

IEEE Potentials

Issue 4 • Oct.-Nov. 2003

Filter Results

Displaying Results 1 - 10 of 10
  • Vulnerabilities of ISPs

    Publication Year: 2003, Page(s):9 - 15
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (689 KB) | HTML iconHTML

    The evolution of networks and the exponential increase of subscribers on the Internet have toughened the role of Internet service providers (ISPs). The widely held assumption, however, that Internet providers are responsible for the security of the networks they interconnect is not correct; consequently, intrusions take place all the time and no ISP is held accountable for the damage. The article ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 802.11: the security differences between b and i

    Publication Year: 2003, Page(s):23 - 27
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    To improve authentication robustness, IEEE 802.11i adds the need for an authentication server to the standard. It also implements a two-way authentication method to prevent the man-in-the-middle attacks that have been so prevalent on IEEE 802.11b networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PC broadband security

    Publication Year: 2003, Page(s):41 - 43
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    The only real disadvantage to broadband is something generally overlooked by the average Internet user, i.e. security. The always on, high bandwidth, connection that cable modems and DSL lines give their users make them alluring targets for unscrupulous people more so than slow dial-up connections. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the job: security clearances

    Publication Year: 2003, Page(s):4 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    Why would you need a security clearance to work? The answer is that, depending on where you want to work and the kind of work you want to do, you may, in fact, need one. Even a low-level, non-academic position at it university may require a security clearance if the work being done is defense related. Out in the "real world", the need to have a clearance is much more commonplace. This is because m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-agent based system for intrusion detection

    Publication Year: 2003, Page(s):28 - 31
    Cited by:  Papers (15)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    This article describes a framework for intrusion detection using agent-based technology. Agents are ideally qualified due to their reactivity, interactivity, autonomy and intelligence. The system discussed is implemented in a TCP/IP LAN (local area network) environment. It represents a step towards a complete multi-agent based system for networking security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IT security model

    Publication Year: 2003, Page(s):6 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1527 KB) | HTML iconHTML

    The first castles in medieval Europe appeared around the 9th century as a result of Viking and Magyar raids. Nobles built castles to control and defend their land and assets. Initially, these structures used natural defenses such as rivers or hills, but soon, earthworks such as mounds, banks and ditches were added for greater defense. In comparison, the first IT security model appeared in the earl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet snooping

    Publication Year: 2003, Page(s):32 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Snooping is the act of intentionally or unintentionally gaining access to another's data for malicious or non-malicious intent. Snooping includes gaining access to someone's e-mail, monitoring telephone calls, and tracking another's World Wide Web use. One can even monitor the characters printed on a monitor's screen, from a distance, with relatively little equipment or cash outlay. Governments ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WLAN standards

    Publication Year: 2003, Page(s):16 - 22
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (615 KB)

    This article introduces various modern WLAN standards with a focus on the IEEE 802.11 family. Moreover influences of policy and regulation in the WLAN market are discussed. Public access WLAN services are introduced with service types. Finally, we conclude with future expectations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Watermarking

    Publication Year: 2003, Page(s):37 - 40
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Digital watermarking attempts to copyright the digital data that is freely available on the World Wide Web to protect the owner's rights. As opposed to traditional, printed watermarks, digital watermarks are transparent signatures. They are integrated within digital files as noise, or random information that already exists in the file. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Essays - An exacting price

    Publication Year: 2003, Page(s): 45
    Request permission for commercial reuse | PDF file iconPDF (190 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sachin Seth
Texas Instruments
sachin3006@gmail.com