Web Hosting Security

  Home arrow Web Hosting Security arrow Page 4 - Online Security Issues: Cracking Down ...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING SECURITY

Online Security Issues: Cracking Down on Hackers
By: Joe Eitel
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 2
    2010-01-20

    Table of Contents:
  • Online Security Issues: Cracking Down on Hackers
  • Hackers and Phishers
  • Staying Safe Online
  • Universities Team up with Northrop to Fight Hackers

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Online Security Issues: Cracking Down on Hackers - Universities Team up with Northrop to Fight Hackers


    (Page 4 of 4 )

    Northrop Grumman designs, integrates, and manufactures military aircraft, defense electronics, precision weapons, and commercial and military aerostructures. Essentially, this is the defense contractor the U.S. depends on to build B-2 stealth bombers. Oddly enough, the company has taken on a new endeavor -- one that has them teaming up with several U.S. universities to fight a war at home: a war agasint hackers.

    Northrop, which is based in Century City, CA, recently announced that they’re committed to investing millions of dollars to help find new and inventive ways to secure computer systems from hackers who--according to them--are “threatening the country's economic and security interests.” The money will be doled out over the course of the next five years to universities handpicked by Northrop because of their expertise and their cyber research branches. The universities include Carnegie Mellon, the Massachusetts Institute of Technology, and Purdue University.

    This initiative--or “group” as it’s being referred to--has been named the Northrop Grumman Cybersecurity Research Consortium . Recently, the Consortium agreed to accept ten projects that will allow them to protect supply chains, examine ways to identify hackers, and secure critical infrastructure networks. According to a statement released by Northrop, members who have been chosen to be a part of the consortium will also be responsible for sharing information, coordinating research projects, writing joint case studies, and developing curricula, among other tasks.

    Whether or not the efforts and the money being funneled into this research are intended to benefit large corporations and government computer systems or the average consumer remains unknown. What is certain, however, is that whatever information is uncovered or whatever breakthroughs are discovered by the Northrop Grumman Cybersecurity Research Consortium will eventually trickle down to everyday Internet users, and hopefully keep them, their personal information, and their computers safe.


    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

    WEB HOSTING SECURITY ARTICLES

    - For Online Security, Invest in People
    - World`s Third-Largest Botnet Bites the Dust
    - Yahoo Security Breach Highlights Poor Practi...
    - How to Prevent Mobile Malware
    - FBI Issues Internet Security for Travelers a...
    - More of the Top Internet Scams
    - How to Stop Phishing Scams
    - Social Networking Safety Tips
    - How to Avoid Financial Fraud Online
    - Android`s Most Notorious Trojans and Viruses
    - GFI Report Details Top 10 Threat Detections ...
    - Sophos Releases Security Threat Report 2012
    - Facebook Safety Tips for 2012
    - Email Scam Hits Apple Users
    - Tips for Mobile Security

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap