Thursday, January 08, 2009

Surfing brain waves: fMRI for lie detection

A possible new lie-detector technology
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Trend Micro
rule

Four Layers of Security Protection.
Web threats are coming at you from every angle. This whitepaper reveals how to protect your network at four different layers to successfully fight the latest web threats. The four layers of protection are deployed in the cloud, at the Internet gateway, across network servers and at the end points. Download this whitepaper now.

rule

Spotlight Story
Surfing brain waves: fMRI for lie detection

M. E. Kabay By M. E. Kabay
One of the critical steps in incident response is the interview. In previous articles I've looked briefly at the use of polygraph as a tool for identifying lies. Today, I will look at another technology for telling truth from fiction: functional magnetic resonance imaging (fMRI). Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Poly want a hacker? Recently I've been updating my chapter on employment policies for improving security in the Computer Security Handbook, 5th Edition, edited by Seymour Bosworth, myself and Eric Whyne (due out Autumn 2008), and I decided to include some information about the use of polygraphs as a tool for screening applicants and employees.

Drawing the lines: Applications of the polygraph In my first article in this series on the polygraph, I introduced a bit of history about the "lie detector." Today I'll review some of the applications of these devices in the 20th century.

Blurred lines: Reliability of polygraph examinations In this series on the polygraph, I'm reviewing some of the applications and issues of interest to security personnel considering polygraphs as a tool for pre-employment screening and in investigations of possible in-house computer crimes. Today, I'll look at the reliability of polygraph testing.

Podcast: Top Cyber-Threats for 2009 Our resident security prognosticator, Mike Paquette from Top Layer Networks, joins us again to review his 2008 predictions in the world of cyber-crime (he did pretty well) and gazes into the crystal ball for 2009, including the prediction that we could be seeing the end of the "trusted" Web site. (13:47)

Podcast: New attack patterns emerge in 2009 Botnets were just the beginning. The bad guys will continue to use these to try and steal your data, but more sophisticated attacks over the application layer and targeted network attacks are on the way. Danny McPherson from Arbor Networks discusses the new ways that hackers will be trying to get into (and steal information) from your network in 2009. (10:30).

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Trend Micro
rule

Four Layers of Security Protection.
Web threats are coming at you from every angle. This whitepaper reveals how to protect your network at four different layers to successfully fight the latest web threats. The four layers of protection are deployed in the cloud, at the Internet gateway, across network servers and at the end points. Download this whitepaper now.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Executive Guide: Green IT
Download this Network World Executive Guide, "Going Green: Trends, tips and case studies," for timely, real-world advice. By adopting an effective green approach to IT you'll save your company money and even bolster company profits. Find out how to make it happen today.
Download this Executive Guide now.

 

01/08/09

Today's most-read stories:

  1. IBM employees buzzing about layoff rumors
  2. AT&T builds $23M IPv6 network for U.S. military
  3. Outlook '09
  4. Is VoIP dead?
  5. Microsoft layoff rumors continue their swirl
  6. Rogue SSL certificate exploit puts VeriSign on the spot
  7. Best iPhone apps: Office and personal productivity
  8. Salary calculator
  9. Nearly 1 million jobs could be created by IT stimulus package
  10. Three ways a Twitter hack can hurt you


Network Security you Need
Zero in on the hottest security technologies you need to know about in this Executive Guide, "The Evolution of Network Security." Stay out in front with the most up-to-date information on network security. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment