DUBLIN, Ireland, 2 July 2007.Research and Markets announces the development of the Department of Defense Information Security Report: The New Model for Protecting Networks Against Terrorist Threats.
The book will be grouped by topic and written in language accessible to a general technical reader. Only the best methods, proven and tested over five years, will be covered, with introductions to related groups of projects provided by the program managers who oversaw the research for that topic area.
There will also be an introductory section, written by various program managers for the DoD, which explains why traditional security techniques are not adequate to meet terrorist threats and which new methods will meet particular corporate and industry network needs.
Examples of the technical methods found in this book:
Techniques and advantages from building smart security in at every level of a network, starting at the individual components level of a computer and extending to the highest levels of network control.
New approaches to creating and using mobile (e.g., Java) code so that valid code is harder to break, and bogus code is easier to detect and block. Software that automatically applies security technologies when it recognizes suspicious activities, as opposed to people having to trigger the deployment of those same security technologies.
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks.