App • ovo l fir public releaw; distribution is uilhmlted. NOTICES DISTRIBUTION: This Research Note has been cleared for release, to the Defense Technical Information Center (DTIC) to comply with regulatory requirements. It has been given no primary distribution other than to DTIC and will be available only through DTIC or the National Technical Information… (More)
The recent Conficker worm has garnered considerable attention by infecting millions of machines and having the potential to cause many problems. Conficker has created a new level of cohesion between security, domain-name-administration, routing, and code-analysis professionals, according to the Shadowserver Foundation's Di Mino.
One of the hot topics in computer technology is software as a service, in which vendors host applications on the Internet and provide them via a browser to users, who perform and store their work online. Users thus don't have to worry about developing, hosting, updating, or maintaining applications or storing data. Several vendors have taken the SaaS… (More)
There are many more machines - defined as things with mechanical, electrical, or electronic properties - in the world than people. And a growing number of machines are networked. Harbor Research, a technology consultancy and analysis firm, estimates that by 2010, at least 1.5 billion devices will be Internet-connected worldwide. The increasingly popular… (More)
Experts have talked about the dangers of mobile malware since the first Palm Pilot Trojan horse, called Liberty, was reported in 2000, and the first mobile-phone virus, Cabir, was reported in 2004. However, each year, mobile viruses and similar threats have turned out to be a minor concern. In part, this is because there have been far fewer smart mobile… (More)
In the past, two key storage technologies, hard drives and flash chips, each had distinct uses. The bigger-selling hard drive technology was used in machines requiring high storage volumes, such as servers, PCs, laptops, and even digital music players. Flash memory was used in machines that needed less storage capacity, such as digital cameras, cell phones,… (More)
By its very nature, Web 2.0 is interactive, allowing users to add input such as participatory book reviews, blogs, wikis, social net works, and video- and photo sharing services to Web sites. Web 2.0 has consequently become very popular with users and Web site operators. However, the approach's interactivity has also made it popular with hackers. This paper… (More)
Business intelligence has long offered the promise of letting companies gather, store, access, and analyze huge amounts of data so that they can make better decisions regarding customers, suppliers, employees, logistics, and infrastructure. BI systems frequently have been unable to get results to users in a timely manner because of component and… (More)