skip to main | skip to sidebar

Math/Sec 270

For students of Math/Sec 270 at John Jay College

Monday, November 3, 2008

Data loss in the age of information

Information is power. This is so true in today's society. We had a great discussion today about ways of obtaining information. Here are a few articles/links that were mentioned:

Bugtraq

Partial Disclosure

The Web Hacking Incidents Database

Privacy Rights Clearing House

Data Loss Database (more information here)

How Can Government Improve Cyber-Security? (I)

How Government Can Improve Cyber-Security (II)

Laptop/Border Control

FISA and Border Searches of Laptops

Laptop searches at the border: No reason? No problem

When Will Social Networking Cripple Corporate Network Security

Videos

CNBC "Big Brother, Big Business"

Privacy is Dead Get Over It (I)

Privacy is Dead Get Over It (II)
Posted by Jamie Levy at 5:10 AM
Labels: data, internet, news, personal security, various notes

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Class Websites

  • Class Website
  • Class Listserve

Blog Archive

  • ▼  2008 (54)
    • ►  December (13)
    • ▼  November (16)
      • XOR Demos
      • A Sixty-Eight Year Old Code
      • Improvised RFID blocking
      • Cryptography
      • Hashing Links
      • Rootkit links
      • Renderlab
      • Google
      • Obama/McCain Hack
      • Defaults and weaknesses
      • Doppelganger effect
      • CBS Early Show
      • Disobeying Corporate Rules
      • Passive ID Theft
      • Data loss in the age of information
      • Capturing Keyboard Strokes
    • ►  October (5)
    • ►  September (18)
    • ►  August (2)

Labels

  • various notes (22)
  • notes (13)
  • news (11)
  • internet (9)
  • personal security (9)
  • data (4)
  • hackers (4)
  • tools (4)
  • crypto (3)
  • labwork (3)
  • media (3)
  • command line (2)
  • myspace (2)
  • network forensics (2)
  • networks (2)
  • policies (2)
  • privacy (2)
  • security breach (2)
  • virus (2)
  • windows (2)
  • basics (1)
  • biometrics (1)
  • csaw (1)
  • cygwin (1)
  • fun (1)
  • google (1)
  • hashing (1)
  • homework (1)
  • links (1)
  • linux (1)
  • phishing (1)
  • rfid (1)
  • social engineering (1)
  • software security (1)
  • talks (1)
  • welcome (1)

Interesting Blogs

  • Schneier on Security
    Ubuntu Disables Spectre/Meltdown Protections
    1 hour ago
  • ...And You Will Know me by the Trail of Bits
    Buckle up, Buttercup, AIxCC’s scored round is underway!
    1 hour ago
  • TaoSecurity
    Creating a Large Text File Viewer by Vibe Coding with Visual Studio Code, Cline, OpenRouter, and Claude 3.7
    2 months ago
  • We Break Things
    Why Many Filipino Nurses Choose to Work Abroad
    10 months ago
  • Errata Security
    C can be memory safe, part 2
    1 year ago
  • Carnal0wnage Blog
    Devoops: Nomad with raw_exec enabled
    5 years ago
  • Jeremiah Grossman
    An idea to help secure U.S. cybersecurity…
    9 years ago
  • invisiblethings' blog
    Migrating my blog out of Blogger...
    10 years ago
  • Devil's Advocate Security
    Part 2: On Passwords, Password Policies, and Teaching
    13 years ago
  • Security Fix
  • McGrew Security Blog
  • Matasano Chargen