keskiviikkona, tammikuuta 14, 2009
Internet on yhteiskuntien tukipylväs
==> Lue Lisää …
Turvallisuuden heikko lenkki
==> Lue Lisää …
tiistaina, tammikuuta 13, 2009
Vievätkö hyvät käytännöt opetuksessa hyvään oppimiseen?
==> Lue lisää Teksti 1 Teksti 2
The dark side of RFID – New challenges for information security and privacy
New technology has continuously changed the face of computing, and each change has involved an improvement in computer architecture and information processing. There are strong indications that the next paradigm shift in information technology will be kicked off by tiny radio frequency identification tags (RFID tags). These lowly devices are being ushered in by corporations like Wal-Mart to facilitate business logistics, but other uses are waiting in the wings. As usual with any technology, criminally-minded individuals have been quick to exploit smart tags for their own purposes. Thus, it is in place to take a look at the dark side of RFID technology to see how it may affect the security and privacy of citizens.
The following two articles of Jorma Kajava, Juhani Anttila and Rauno Varonen on this topic:
- Radio frequency identification as a challenge to information security and privacy
- The dark side of rfid – New challenges for information security and privacy
were included in two large handbooks and encyclopedia of IGI Global (IdeaGroup, Inc.):
- Encyclopedia of Digital Government (3 Volumes) 2007
- Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (6 Volumes) 2008
This topic has been considered also in Finnish in a previous blog post.
maanantaina, tammikuuta 12, 2009
A comprehensive new book on information security
- Basics of security concepts, services, and threats
- Models for quality of the business integrated information security management
- Principles of user authentication technologies
- Principles of authorization and access control and their applications
- Security of data-centric applications
- Principles of modern cryptology and new research challenges in this field
- Network security and its dynamics
- Public key and privilege management infrastructures
- Architectural and functional characteristics of smart cards and similar tokens
- Privacy issues and privacy-enhancing technologies from legal and technical perspectives
- Legal and technical issues relating to secure content-filtering technologies
- A model for cybercrime investigations for forensic examination and presentation
- Systemic-holistic approach to IT security with subjective details based on objective knowledge
- Secure electronic voting systems using cryptology models and protocols
- Requirements and architecture for mobile wiki systems security
Chapter 3 in the book (pages 21 ... 34) on “Business-integrated information security management” was made by Juhani Anttila, Jorma Kajava, Rauno Varonen and Gerald Quirchmayr.
This topic has also been considered in Finnish and in English in two previous blog posts: #1 and #2
lauantaina, tammikuuta 10, 2009
Tietotekniikan ja –palvelujen ulkoistaminen ja innovaatiot
==> Lue lisää ...
Tietoturvan mittaaminen - prosesseista ymmärrykseen
==> Lue lisää ...
sunnuntai, tammikuuta 04, 2009
Uutta innovaatiota etsimässä – Tietoturva ja paperikoneteknologia
==> Lue lisää …
perjantaina, tammikuuta 02, 2009
Tietotyötä pohjoisessa – Verkottumisen ja Barentsin alueen mahdollisuudet Pohjois-Suomen tietotyön kehittämisessä (Knowledge Work in the North)
==> Lue lisää …
In Finland, work has traditionally focused on concrete objectives. In knowledge work, the outcomes are very often abstract in form – research results, plans, and software applications - and thus deviate from what is expected in traditional production. One wholly singular form of knowledge work is management. Information security questions become important in oursourcing knowledge work even to faraway countries. The early 1990s taught us that merely processing paper documents is not enough to feed a nation. But, are our competencies in knowledge work today enough to keep Finnish business competitive and keep Finnish companies in Finland? How will the growth we see in the Barents Region be reflected in the demand for knowledge and know-how in Northern Finland? Do we have the resources with networking capability in the scale required?
==> Read more … (see pages 49 ... 55)
torstaina, tammikuuta 01, 2009
Tietoturvallisuus on arkipäiväistä
==> Lue lisää: Teksti 1 Teksti 2
Tämän blogin aineistojen
käyttöoikeutta koskee
Creative Commons
lähde mainittava 3.0 -lisenssi.