New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 981
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image prot: Security HeadLines: XML-Based Security Spec Aims To Protect Applications image
Protocols
By George V. Hulme
InformationWeek
April 15, 2003

IT security pros are aware that hackers and data thieves are increasingly targeting software vulnerabilities that traditional intrusion-detection systems, firewalls, and antivirus software do little to defend against.

To thwart the growing threats, more companies have been turning to various security products to get the job done: patch-management applications to push software updates across the network; application and vulnerability scanners to find security holes; and application firewalls to block attacks waged against Web apps.

A small group of Internet security companies have an idea they hope will make it easier for administrators to lock down their apps. The group has proposed the Application Vulnerability Description Language to the standards group Oasis. AVDL, based on XML, will be designed to provide a standard way for application vulnerabilities to be defined and classified so all of the applications companies use to secure their apps will speak the same language when it comes to security threats.

The group, founded by Citadel Security Software, GuardedNet, NetContinuum, SPI Dynamics, and Teros, hopes to have version 1.0 of the spec completed by year's end. The first full meeting of the Oasis technical committee is slated for May 15.

If it works as promised, AVDL would help security pros better react to newfound software vulnerabilities and attacks, says Pete Lindstrom, research director for Spire Security. Eric Ogren, senior analyst at the Yankee Group, agrees. "This is a good idea to better help companies manage risks to the application security," he says.

More at source: Internet Week
Posted on Tuesday, 15 April 2003 @ 08:53:52 EDT by cj
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· HotScripts
· W3 Consortium
· TCP/IP Protocol Suite
· More about Protocols
· News by cj


Most read story about Protocols:
Free Online Port Scanning Utilities

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register