AUTHOR ARCHIVES

Luba Vangelova

Results 11-20 of 20

Authentication and Access Control

May 1, 1997 efore any other security measures become meaningful, there must be a way to reliably identify authorized computer system users and lock others out. Once identified, authorized users should have limited access to the system's resources, consistent with their work responsibilities. The most commonly used authentication technique is a password. But...

Computer Security Guide

May 1, 1997 ur special report on security focuses on products and methods that protect the government's computer data against threats to confidentiality, reliability, integrity and availability. We cover encryption, intranet firewalls, anti-virus software, power protection and disaster recovery techniques. Click on a topic below to learn more. New Technology Means New Risks...

New Technology Means New Risks

May 1, 1997 nformation technology has enabled government agencies and departments to work more efficiently. But with the productivity improvements have come new risks to the confidentiality, integrity, reliability and availability of government information, which increasingly resides on computer systems. Threats range from human error to theft, vandalism, organized crime, terrorist operations, power...

Computer Security Guide

May 1, 1997 May 1997 INFORMATION TECHNOLOGY Computer Security Guide By Luba Vangelova ur special report on security focuses on products and methods that protect the government's computer data against threats to confidentiality, reliability, integrity and availability. We cover encryption, intranet firewalls, anti-virus software, power protection and disaster recovery techniques. Click on a...

Year 2000 Deadline Not Negotiable

May 1, 1997 hether Jan. 1, 2000, will be a day of high anxiety or relief for federal executives depends on whether the government successfully completes its largest information technology project to date, a multibillion-dollar effort to solve what is known as the year 2000 problem. Awareness of the problem has grown significantly...

Powering Up the Virtual Office

April 1, 1997 ariley Ferens works for the General Services Administration in Washington. But her physical office is more than 2,000 miles away, in her home in Seattle. "Most of what I do can be done from anywhere," says Ferens, senior site coordinator for the GSA's Office of Workplace Initiatives. Increasingly powerful desktop...

Multimedia: Not Just for Games

January 1, 1997 housands of Coast Guard technicians now learn how to troubleshoot aircraft systems at their computer terminals. But instead of scrolling past screens of text describing helicopter electronics the trainees see some text, supplemented by two- and three-dimensional animation and still photos of the aircraft. "You have to keep [the training...

Virtual Reality Turns Inside Out

October 1, 1996 his year, for the first time, some military medic training sessions on gunshot wound treatments required no bloody cleanup. Instead of relying solely on wounded animals, medic trainees practiced techniques by guiding simulated instruments through simulated human tissue. Watching a three-dimensional impression of a leg wound on a high-resolution computer...

Going Mobile With Computers

August 1, 1996 pecial operations planes will soon be able to zero in on targets located with hand-held computers carried into the field by ground troops. Soldiers will point a laser range finder at a target, and the laser device will then feed information into a hand-held global positioning system unit, which will...

Meltdown

January 1, 1996 atch declares alert. Unit 2 hit by lightning." The ominous message appeared suddenly on monitors throughout the Nuclear Regulatory Commission's operations center in Rockville, Md., at 9:27 a.m. on Aug. 23. The Edwin I. Hatch nuclear power plant in Bailey, Ga., was in trouble. Lightning had struck one of the...