Five Biggest Trends in Tech According to Forbes The Art of War by Sun Tzu Cadets train for cyber-warfare War video games take over sales charts 10th Anniversary of the Browser Internet Security Alliance Penetrating the Great Wall of China "We Love the Iraqi Information Minister" New Security Standards for Managers FTC Files Suit Against Sender of Porn 'Spam' Stratford News
Sun Tzu paraphrased, ?The general who sees the battlefield more clearly than the opponent, can respond to developments faster than the opponent, and can do it in a way not seen by the enemy, will prevail.?
This is accomplished by getting the right information to the right people at the right time.
Information Technology is central to this process (Information Centric Warfare)
IT has also invaded B-schools?..responsible for e-business thrust
The Cyber Defense Exercise conducted this week among the nation’s service academies is a new kind of drill to prepare a new kind of military.
The third annual drill, which ran Monday through Thursday, included computer specialists from the three major military academies as well as institutions like the U.S. Coast Guard Academy.
At West Point, a "blue team" of a few dozen cadets faced off against a "red team" of hackers from the National Security Agency
Combat-themed video games dominated the U.S. sales charts in early April
NovaLogic’s "Delta Force: Black Hawk Down" topped the list of best-selling PC games
In four of the last five weeks, fully 50 percent of the top games list has been either stand-alone war games, or add-on packages for existing war games.
Holding the No. 2 spot Electronic Arts Inc. with "Command & Conquer: Generals
Voice of America broadcasts has commissioned software that lets Chinese Web surfers sneak around the boundaries set by their government.
The software enables PC users running Microsoft’s Windows XP or 2000 operating systems to set up a simple version of what’s known as a circumvention Web server, or a computer that essentially digs a tunnel under a firewall set up by a government, corporation, school or other organization.
The government has blocked popular search engines. In one U.S. study, China was found to be blocking 19,000 Web sites including those providing news, health information, political coverage and entertainment
The software, which uses Secure Sockets Layer (SSL), lets the person who installs it set up a miniature Web site through which a firewall-restricted surfer can access the rest of the Web.
Haselton on Wednesday posted instructions on how to use the software on his Peacefire Web site.
Security is on every IT manager?s priority list, but what is security and how can executives measure and promote their efforts?
The initiative aims establish practical guidelines that draws on corporate experience with accounting principles.
Information releases at the RSA 2003 Conference
The Generally Accepted Information Security Principles (GAISP) are intended to be a set of guidelines similar to the Generally Accepted Accounting Principles (GAAP) that U.S. corporations follow when they submit their financial reports. GAISP will include a set of procedures by which any company can derive its own security architecture.
The industry group promoting the principles, Information Systems Security Association (ISSA) , will pitch GAISP as a badge of honor that companies can use to boast that they are secure.
The work began in 1990 under the name GASSP (Generally Accepted System Security Principles), and draws on other work including IS 17799, the standard for a security code of practice from the International Organization for Standardization (ISO), which was originally developed by the British Standards Institute.
The Federal Trade Commission is suing one of the country’s most active purveyors of pornographic junk e-mail, part of a stepped-up push by the agency to combat spam.
The lawsuit, filed Tuesday in federal court in Illinois, alleges Brian D. Westby of Missouri violated federal laws by sending e-mail whose deceptive subject lines, such as "What is wrong?" and "Fwd: You may want to reboot your computer," camouflaged the actual content: images of scantily clad women and links to 20 porn Web sites Westby operated, many of them featuring "married but lonely" women.
FTC officials said its spam database, which is receiving about 120,000 e-mails per day forwarded by citizens, collected 46,000 from Westby’s various endeavors.
The agency further alleged Westby used "spoofing" — a common spammer practice that disguises the Internet address of the computer that sends the spam — and provided a means of unsubscribing from e-mail lists that did not work.
Stratford News
Masters in Telecommunication Systems
Enterprise Business Management
Bachelors in Hospitality Management, Business Administration, Information Mangement