Saturday, January 12, 2002

Intelligence Community Markup Language
The IC Metadata Sub-Working Group (MSWG) has developed the Intelligence Community Markup Language (ICML) as part of the ICCIO Executive Council and Working Group commitment to IC inter-organization interoperability. ICML is based on a number of data modeling activities that have occurred in the IC over the last ten years, all of which have been used in one way or another to develop ICML.

The first focus of ICML is to aid finished intelligence production. Since a majority of the intelligence content being produced within the IC takes the form of documents, it was felt by the MSWG that limiting the scope of the initial ICML release to this type of intelligence content would yield the most benefits in the shortest period of time. The ICML standard as written incorporates key writing styles, metadata, and structure requirements of typical IC products.

ICML is described as a Document Type Definition (DTD).
Secure Communications Operational Tracraft
A PDF file on 'how not to be seen'.

Friday, January 11, 2002

Seven Simple Computer Security Tips

  • Use strong passwords. Choose passwords that are difficult or impossible to guess. Give different passwords to all accounts.

  • Make regular backups of critical data. Backups must be made at least once each day. Larger organizations should perform a full backup weekly and incremental backups every day. At least once a month the backup media should be verified.

  • Use virus protection software. That means three things: having it on your computer in the first place, checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically.

  • Use a firewall as a gatekeeper between your computer and the Internet. Firewalls are usually software products. They are essential for those who keep their computers online through the popular DSL and cable modem connections but they are also valuable for those who still dial in.

  • Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection.

  • Do not open e-mail attachments from strangers, regardless of how enticing the Subject Line or attachment may be. Be suspicious of any unexpected e-mail attachment from someone you do know because it may have been sent without that person’s knowledge from an infected machine.

  • Regularly download security patches from your software vendors.

Wednesday, January 09, 2002

.Net vote rigging illustrates importance of Web services
In December, Java was more popular than .Net for building Web services, according to a ZDNet UK poll, but weeks later the position had dramatically reversed; investigation revealed just what lengths Microsoft will go to to promote its products.

Tuesday, January 08, 2002

IT Security Cookbook
This book is intended as a 'self help' guide to computer & network security, primarily for security managers, programmers and system administrators.