31. For all the power and complexity of modern computer networks, practical computer security against cybervandals may ultimately be found in the commonplace concept of a burglar alarm. 32. Given the dangers of computer security breaches, there will also be a proliferation of jobs in such new areas as privacy protection and security audits. 33. Hanssen had earlier raised the issue of FBI computer security, and now said he was trying to prove that the network was not secure. 34. Hackers, she explained, are computer security whizzes who may dress weird and have a rebellious streak but do not use their technical skills to commit crimes. 35. He had focused much of his attention on the need for greater computer security, both at the laboratories and throughout the Energy Department. 36. He declined to say who would attend, but said that the purpose would be for the government and private industry to cooperate in enhancing computer security. 37. He has designed and maintains a former underground Web site called hideaway.net that focuses on computer security. 38. He suggested that the states upgrade computer security and asked whether they had cataloged the vulnerability of critical sites. 39. He said he believed that unless he continued to demonstrate the vulnerability of many Web sites, computer security would not be improved. 40. In fact, some of the most interesting recent developments in computer security were created to cope with the temptation to let things slide. |