^
+ Follow MARI LOLARGA Tag
Array
(
    [results] => Array
        (
            [0] => Array
                (
                    [ArticleID] => 153124
                    [Title] => Network Security: the new challenge
                    [Summary] => With over 40,000 sites on the World Wide Web containing some form of "hacker tools," the ranks of hobbyist hackers and writers of computer viruses are expected to grow exponentially. 


Just about any sufficiently motivated information technology novice can trash the stock exchange website or redirect it to a porn site. Just about anyone with basic programming skills and an unhealthy sense of adventure can unleash another ILOVEYOU virus and destroy stored data anywhere in the world.
[DatePublished] => 2002-03-08 00:00:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => 1212707 [AuthorName] => Carla Paras-Sison [SectionName] => Technology [SectionUrl] => technology [URL] => ) [1] => Array ( [ArticleID] => 153125 [Title] => How to secure your network? [Summary] => Mari Lolarga, head of data security of ADTEL, Inc., says there are three major security objectives that need to be accounted for by anyone who wants to secure his network. These are:

• Confidentiality
— making sure that private data stays private

• Integrity
— ensuring that data and systems have not been altered in an unauthorized manner.

• Availability
— ensuring that systems and data are there when needed
[DatePublished] => 2002-03-08 00:00:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => Technology [SectionUrl] => technology [URL] => ) ) )
MARI LOLARGA
Array
(
    [results] => Array
        (
            [0] => Array
                (
                    [ArticleID] => 153124
                    [Title] => Network Security: the new challenge
                    [Summary] => With over 40,000 sites on the World Wide Web containing some form of "hacker tools," the ranks of hobbyist hackers and writers of computer viruses are expected to grow exponentially. 


Just about any sufficiently motivated information technology novice can trash the stock exchange website or redirect it to a porn site. Just about anyone with basic programming skills and an unhealthy sense of adventure can unleash another ILOVEYOU virus and destroy stored data anywhere in the world.
[DatePublished] => 2002-03-08 00:00:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => 1212707 [AuthorName] => Carla Paras-Sison [SectionName] => Technology [SectionUrl] => technology [URL] => ) [1] => Array ( [ArticleID] => 153125 [Title] => How to secure your network? [Summary] => Mari Lolarga, head of data security of ADTEL, Inc., says there are three major security objectives that need to be accounted for by anyone who wants to secure his network. These are:

• Confidentiality
— making sure that private data stays private

• Integrity
— ensuring that data and systems have not been altered in an unauthorized manner.

• Availability
— ensuring that systems and data are there when needed
[DatePublished] => 2002-03-08 00:00:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => Technology [SectionUrl] => technology [URL] => ) ) )
abtest
Are you sure you want to log out?
X
Login

Philstar.com is one of the most vibrant, opinionated, discerning communities of readers on cyberspace. With your meaningful insights, help shape the stories that can shape the country. Sign up now!

Get Updated:

Signup for the News Round now

FORGOT PASSWORD?
SIGN IN
or sign in with