- Full text PDF available (0)
I nformation linked to individual persons was once difficult to find and even more burdensome to cross-reference. Now, such information is readily accessible and collectible through the use of automated search facilities. The threat to personal privacy has never been greater. This article presents examples of how current technology is being used to… (More)
As open systems interconnection (OSI) technology establishes global standards for data communications, security is becoming an increasingly important issue for open systems and computer networks. This paper provides an overview of the OSI Reference Model, and discusses the placement of security services in this model.
The National Security Agency (NSA) is a silent government organization whose powerful role in controlling the design and use of non-military cryptographic algorithms has generated controversy and criticism. Because so little is known about this secretive agency, this article outlines the history of the NSA. From the rise of the American Black Chamber during… (More)
In order for a distributed network to function securely, the integrity of the data transmitted over the communication links must be maintained. The use of either link encryption or end-to-end encryption will help to maintain the integrity of transmitted data, although there are differences in the level of security which they provide. This paper begins with… (More)