Beyond Computers in Computer Security

By John Markoff N. Y. Times News Service | THE JOURNAL RECORD, April 24, 2000 | Go to article overview

Beyond Computers in Computer Security


John Markoff N. Y. Times News Service, THE JOURNAL RECORD


SAN FRANCISCO -- For all the power and complexity of modern computer networks, practical computer security against cybervandals may ultimately be found in the commonplace concept of a burglar alarm.

That is the notion of Bruce Schneier, one of the nation's best- known cryptographers -- people who specialize in writing and cracking secret codes. Schneier, who is a computer scientist and the author of a best-selling technical book, Applied Cryptography, has recently transformed his small consulting practice into an Internet alarm company backed by venture capitalists.

Schneier's credentials include creating the Twofish encryption algorithm, which is a candidate to become the advanced encryption standard being set by the National Institute of Standards and Technology. So it may seem odd that a scientist who designs unbreakable mathematical locks for protecting information is calling on e-commerce companies to put mere people back in the computer- security equation.

But Schneier argues that to trust the safety of information stored in a computer system to even the most powerful computer security software alone is foolhardy. That is why his new company, Counterpane Internet Security, has adopted a business model remarkably like that of ADT Security Services, the burglar alarm company.

"My basic philosophy is that technical protection mechanisms such as fire walls, encryption and authentication only go so far," Schneier said, referring to some of the more popular computer security technologies. "Every protection mechanism ever built has a flaw. They can be hidden for years, but they're there."

Counterpane, based in San Jose, Calif., and which last year raised $7 million in financing from Accel Partners and Bessemer Venture Partners, has just finished building its first secure operations center in nearby Mountain View, Calif. (A backup center is being built in Chantilly, Va.)

The operations center, which has high-speed links to the Internet, is reinforced to resist physical attacks and further protected by video surveillance and special "biometric" access controls that require positive physical identification of staff members before they are allowed to enter.

Inside, operators work in shifts around the clock, watching their clients' computers, which are connected via the Internet from locations around the world. Although various companies have been taking part in tests, the one paying customer Counterpane would identify was VoteHere.com. The center's operators monitor information generated by a program that Counterpane developed, known as Socrates, which assigns categories and priorities to the network activities it detects, seeking signs of hostile computer attacks. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Beyond Computers in Computer Security
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.