Securicom '84

Securicom '84

- IC - be stolen. The new software is based on the familiar PRO-TEC, the MAS encryption system that runs on many mainframes. The increasing US sens...

209KB Sizes 5 Downloads 55 Views

-

IC

-

be stolen. The new software is based on the familiar PRO-TEC, the MAS encryption system that runs on many mainframes. The increasing US sensitivity on the export of high-technology products, especially in the security-conscious electronics field, is well illustrated by the restrictions placed on the sale and distribution of VAULT. Due to its ability to encrypt text, data and software, the National Security Agency has notified MAS that several precautions must be observed to comply with federal regulations on lawful use. Specifically, MAS cannot sell or distribute VAULT outside the United States or to agents of foreign governments. In addition, disks holding the software must not be physically transported over US national borders nor be accessed by or transmitted to telecommunication terminals outside of the States. Readers requiring further information on VAULT should contact MAS at 6826 Dean Drive, McLean, Virginia 22101, USA. EDPACS has no readership restrictions, fortunately, and can be reached at 11250 Roger Bacon Drive, Suite 17, Reston, Virginia 22090, USA.

SECURE NETWORK FOR DEFENSE?

Fearing that hackers might tap into Arpanet and gain access to the National Security Agency's Community Online Intelligence Network, the US Department of Defense has split off part of its communications system to create a high-security defense data The new network will not be linked to network, called Milnet. Arpanet. For the Arpanet will remain in operation for its usual channels. past 15 years, it has been a communications channel for military and non-military data. The US Government data encryption.

SECURICOM

‘84

is to develop secure network using point-to-point

The 2nd Worldwide Congress on Computer and Communications Security and Protection is being held early next year - 29 February-2 March 1984. It will be located, as last year, at the Palais des Festivals et des Congrss, at Cannes in the South of France. Securicom 83 was a huge success - delegates came from all branches This of commerce and industry, representing over 20 countries. year, Securicom will again bring together all those concerned with the growing threat of computer crime - auditors, accountants, security managers, EDP managers and many others. An exhibition of a whole range of equipment, and consultancy services will run concurrently with the conference. An international team of experts will present papers on a whole range of subjects: DAY ONE 1. The legal Computer Securit the European situation. challenge of computer vulnerability: Computers and criminal law. The formation of contracts by telex.

COlUPUTEB~?WWD&

SINURITY

BUIUTRN

Volume 6 Number 1

-

11

-

the state of Italian legislation and the Security and privacy: effects of harmonisation on the European problem. Risk

analysis

Risk Analysis. A methodology for the evaluation of the security of information systems and their level of protection against international misuse and fraud. Enhancing information security with the information resource management approach. The security of information systems. Physical Security. Typical EDP-centre dangers resulting from technical omissions. Experience with automatic fire extinguishers (Malon 1302 and C02) in a computer centre. Computer Fraud. teleprocessing.

How to detect illegal listening in Computer fraud in the UK.

DAY TWO Computer Audit. Computer control from security processes to a posteriori contra. Computer audit: methods, responsibility and case analysis. Office.

Office system security - what can be done. Risk analysis in office support systems. Security problems for micro and minicomputers. the Network Security. A secure network code. Network protection: proton system Security in interbank transfers: controls in and around SWIFT. Integration reliability and security factors in telecommunications network design.

Electronic Signature - Payment Card Security. Use of the 'signature token' to create a negotiable document. Security problems concerning chip card applications. Digital signatures with the data encryption standard. The MM-key system and its improvements: a proven defence against counterfeiting of credit cards.

DAY THREE Contingency planning. in computer contingency centres.

Contingency.

The state-of-the-art

Back-up. Conversational back-up. Contingency services of the UITWISK computer centre. A back-up solution: DP under an inflatable structure. Back-up and Insurance Back-up through mutual assistance agreement. A structural approach to data processing insurance: optimum security/cost ratio.

an

The conference will be in French, with a simultaneous translation in English. The conference costs E435.00/$670.00 (plus tax which is recoverable for all non-French residents). This covers accommodation for 3 nights in a 4-star luxury hotel, participation at all conference sessions and copies of all the papers and access to the Securicom '84 exhibition.

Volume 6 Number 1

- 12 -

Discom t .for subscribers

We are offering a special 10% discount for all COMPUTER FRAUD & SECURITY Bulletin subscribers, which will mean that the conference costs E391.50 ($603.00) OK E443.25 ($683.10) including tax. You should have received a brochure and booking form with your copy of the Bulletin. If by any chance it has fallen out, or if you have any queries, please contact Andrew Carey at Securicom '84, Elsevier International Bulletins, 256 Banbury Road, Oxford, UK; Tel: (0865) 512242.

Oxiord Efsevier

OS2

7I)fi.

f~In,gland.

fnternationaf ;Zvcmuc. 10017,

52\‘anderhilt New York, KY

f
;\E

flulletins, 11Sh. ISulletins, Amstwdam,

Subscription f'rice (inc. shipping & h;~ndling) I'%$ f Stg Dutch guiltlrrs I yt%1175.00 85.00 450.00 :j)'c'nrs .135.00 210.00 1125.00