Featuring 4 Papers as of September 17, 2008
Securing the K-12 School Network through Effective Internet Access Control, Network Traffic Monitoring, and Data Analysis.
by Barry Young - September 17, 2008
Internet access control, network traffic monitoring, and related data analysis, are powerful tools available to the K-12 Network Security Analyst
Echelon: The Danger of Communication in the 21ST Century
by Chad Yancey - February 1, 2002
How governments are using Echelon to gain and collect information on not only political or military interests, but that they are suspected of using this system on common citizens
Information Assurance at the PC Level
by Carlton Bowen - December 10, 2001
This paper contemplates a bottom up approach to information security, where attention is given to information assurance at the PC level initially, rather than as an after thought.
First Step Data Capture - Key Stroke Loggers
by Nigel Lewis - August 15, 2001
An examination of software and hardware keystroke logging, with mention of malicious keystroke logging, and keylogger detection options.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact email@example.com.
All papers are copyrighted. No re-posting or distribution of papers is permitted.