CRIME [Fwd: [Information_technology] Daily News 01/03/03]

From: Lyle Leavitt (lylel@private)
Date: Fri Jan 03 2003 - 14:06:19 PST

  • Next message: Jacob Redding: "RE: CRIME Microsoft Windows XP question"

    -------- Original Message --------
    Subject: [Information_technology] Daily News 01/03/03
    Date: Fri, 3 Jan 2003 10:28:32 -0600
    From: "NIPC Watch" <nipc.watch@private>
    To: "Information Technology" <information_technology@private>
    
    January 1, Bloomberg
    Poll says computer-related spending will grow 4.6% this year. Top executives
    plan to increase spending on computer hardware and software by 4.6 percent
    this year, with security programs a top priority, according to a CIO
    Magazine poll. About 53 percent of the 335 executives surveyed last month
    said they plan to spend more on programs to block computer viruses and other
    security software. The poll on computer spending plans is conducted monthly
    by CIO Magazine, Deutsche Bank Securities Inc. and Prudential Securities
    Inc. Security software has been one of the few bright spots in the computer
    industry, which is trying to pull out of a two-year slump, as companies seek
    to protect data from viruses such as ``Nimda'' and ``Code Red'' and guard
    against hackers. Source.
    http://quote.bloomberg.com/fgcgi.cgi?ptitle=Technology%20News&s1=blk&tp=ad_t
    opright_tech&T=markets_box.ht&s2=ad_right1_technology&bt=ad_position1_techno
    logy&box=ad_box_all&tag=technology&middle=ad_frame2_technology&s=APhJ5hRT1Q2
    9tcHV0
    
    December 30, New York Times
    Checking databases for terrorists' names. Since the Sept. 11 attacks, the
    Treasury Department's Office of Foreign Asset Control (OFAC) has issued new
    regulations compelling companies in industries like banking and tourism to
    check the office's list of potential terrorists, or face hefty fines. There
    are a few ways computers can tackle the name-search problem. A simple
    database search will look for a string of characters, called a key-based
    search, and try to find a match. But if the string is not exact, the process
    is futile. A more sophisticated search, using what is called fuzzy logic,
    can look for similar strings and return the closest matches. But that can
    return many inaccurate results. Government agencies rely heavily on the
    Interagency Border Inspection System (IBIS), a vast database of information
    on suspect individuals, businesses, vehicles, aircraft and vessels, to help
    identify potential terrorists. In addition, all airlines flying into the
    United States must now check passenger information against IBIS for all
    passengers and crew members. However, a single name - particularly a
    transcribed, transliterated or mistyped name - can easily disappear in such
    a system. The future of name-searching, according to the technology
    companies developing software for the public and private sectors, is not in
    watch lists, but in sifting through huge quantities of digital documents,
    like those that might be found on terrorists' computers or intercepted
    online. Source. http://www.nytimes.com/2002/12/30/technology/30LIST.html
    
    _______________________________________________
    Information_technology mailing list
    Information_technology@listserv
    http://listserv.infragard.org/mailman/listinfo/information_technology
    



    This archive was generated by hypermail 2b30 : Fri Jan 03 2003 - 18:48:37 PST