Copyright(c) Fred Cohen, 1995-2003 - All Rights Reserved

These journal articles are free to view in electronic form via your World Wide Web browser, however, the publications that originally published these articles maintain their copyrights. You may not copy or republish them or store them in your computer or elsewhere except as required by your browser for the sole purpose of viewing them while using the browser.


Notice

As of July, 2003, Managing Network Security will no longer be published by Network Security Magazine. After an 8 year run, they have finally given up the ghost to move back to more technical articles. Such is life. I would like to express my appreciation to the editors for supporting these articles for so many years and to you my readers for reading and enjoying them. Keep looking out for more in other forms. FC

Managing Network Security


2003

  • July, 2003 - Why?
  • June, 2003 - Background Checks
  • May, 2003 - Operations Security for the Rest of Us
  • April, 2003 - Documenting Security
  • March, 2003 - Novelty Detection
  • February, 2003 - Switching Your Infrastructure
  • January, 2003 - Security Programming

    2002

  • December, 2002 - Back Up a Minute
  • November, 2002 - Breaking In - to test security?
  • October, 2002 - Reworking Your Firewalls
  • Sepember, 2002 - Deception Rising
  • August, 2002 - You're in a Bind!
  • July, 2002 - Is Open Source More or Less Secure?
  • BOUNS ARTICLE - July, 2002 - Smashed Again by Stupid Security
  • June, 2002 - Academia's Vital Role in Information Protection
  • May, 2002 - Terrorism and Cyberspace
  • April, 2002 - Misimpressions We Need to Extinguish
  • March, 2002 - Embedded Security
  • February, 2002 - How to Get Around Your ISP
  • January, 2002 - The End of the Internet as we Know it

    2001

  • December, 2001 - The World Doesn't Want to be Fixed
  • November, 2001 - The Deception Defense
  • October, 2001 - The DMCA
  • September, 2001 Special Issue - The Balancing Act
  • September, 2001 - The Best Security Book Ever Written
  • August, 2001 - Bootable CDs
  • July, 2001 - A Matter of Power
  • June, 2001 - The Wireless Revolution
  • May, 2001 - The New Cyber Gang - A Real Threat Profile
  • April, 2001 - To Prosecute or Not to Prosecute
  • March, 2001 - Corporate Security Intelligence
  • February, 2001 - Testing Your Security by Breaking In - NOT
  • January, 2001 - Marketing Hyperbole at its Finest

    2000

  • December, 2000 - The Millennium Article - Yet Again! - The Bots are Coming!!! The Bots are Coming!!!
  • November, 2000 - Why Everything Keeps Failing
  • October, 2000 - The Threat
  • September, 2000 - Chipping
  • August, 2000 - Understanding Viruses Bio-logically
  • July, 2000 - What does it do behind your back?
  • June, 2000 - Why Can't We Do DNS Right?
  • May, 2000 - Eliminating IP Address Forgery - 5 Years Old and Going Strong
  • April, 2000 - Countering DCAs
  • March, 2000 - Collaborative Defense
  • February, 2000 - Worker Monitoring
  • January, 2000 - Digital Forensics

    1999

  • December, 1999 - Why it was done that way
  • BONUS ARTICLE - November, 1999 - So Much Evidence... So Little Time
  • November, 1999 - The Limits of Cryptography
  • October, 1999 - Security Education in the Information Age
  • September, 1999 - In Your Face Information Warfare
  • August, 1999 - What's Happening Out There
  • July, 1999 - Attack and Defense Strategies
  • June, 1999 - The Limits of Awareness
  • May, 1999 - Watching the World
  • April, 1999 - Simulating Network Security
  • Bonus Article: Incident at All.Net - 1999 Edition
  • March, 1999 - The Millisecond Fantasy
  • February, 1999 - Returning Fire
  • January, 1999 - Anatomy of a Successful Sophisticated Attack

    1998

  • December, 1998 - Balancing Risk
  • November, 1998 - The Real Y2K Issue?
  • October, 1998 - Time-Based Security?
  • September, 1998 - What Should I Report to Whom?
  • August, 1998 - Third Anniversary Article - The Seedy Side of Security
  • July, 1998 - How Does a Typical IT Audit Work?
  • June, 1998 - Technical Protection for the Joint Venture
  • May, 1998 - Risk Staging
  • April, 1998 - The Unpredictability Defense
  • March, 1998 - Red Teaming
  • February, 1998 - The Management of Fear
  • January, 1998 - Y2K – Alternative Solutions

    1997

  • December, 1997 - 50 Ways to Defeat Your Intrusion Detection System
  • November, 1997 - To Outsource or Not to Outsource - That is the Question.
  • October, 1997 - The Network Security Game
  • September, 1997 - Change Your Password – Do Si Do
  • August, 1997 - Penetration Testing?
  • July, 1997 -
  • June, 1997 - Relativistic Risk Analysis
  • May, 1997 - Prevent, Detect, and React
  • April, 1997 - Would You Like to Play a Game?
  • March, 1997 - Risk Management or Risk Analysis?
  • February, 1997 - Network Security as a Control Issue
  • January, 1997 - Integrity First - Usually

    1996

  • December, 1996 - Where Should We Concentrate Protection?
  • November, 1996 - How Good Do You Have to Be?
  • October, 1996 - Why Bother?


    Internet Holes

  • September, 1996 - The SYN Flood
  • August, 1996 - Internet Incident Response
  • July, 1996 - Internet Lightning Rods
  • June, 1996 - UDP Viruses
  • May, 1996 - Eliminating IP Address Forgery
  • April, 1996 - Spam
  • March, 1996 - Bonus: Incident at All.Net
  • March, 1996 - The Human Element
  • January, 1996 - Automated Attack and Defense

    1995

  • December, 1995 - 50 Ways to Attack Your World Wide Web Systems
  • November, 1995 - Network News Transfer Protocol
  • October, 1995 - The Sendmail Maelstrom
  • September, 1995 - Packet Fragmentation Attacks
  • August, 1995 - ICMP