<?xml version="1.0" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Articles by Tony M. Damico  - Inquiries Journal</title>
    <link>http://www.inquiriesjournal.com/authors/34/tony-m-damico</link>
    <description>Inquiries Journal provides undergraduate and graduate students around the world a platform for the wide dissemination of academic work over a range of core disciplines.</description>
    <language>en-us</language>
    <pubDate>Sun, 24 May 2026 12:12:08 -0400</pubDate>
    <lastBuildDate>Sun, 24 May 2026 12:12:08 -0400</lastBuildDate>
	
			<item>
				<title>Distributed Trust Based Management: Who&#39;s Getting In?</title>
				<link>http://www.inquiriesjournal.com/articles/58/distributed-trust-based-management-whos-getting-in</link>
				<description>By Tony M. Damico - As in the case of a national accounting firm that handles accounts related to a wide variety of industries and company size, there would be multiple offices across a wide geographical area with many managers vying for control and access to data or information. Few data sources are more confidential than the financials of a business. Maintaining strict confidentiality through precise access control is an absolute must. In a company managing funds and accounts for an eclectic set of clients, multiple access attempts from users of all levels and needs will be ongoing. A simple list attempting to...</description>
				<pubDate>Thu, 19 Nov 2009 10:40 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/58/distributed-trust-based-management-whos-getting-in</guid>
			</item>
			<item>
				<title>Cyber Attack Prevention for the Home User: How to Prevent a Cyber Attack</title>
				<link>http://www.inquiriesjournal.com/articles/47/cyber-attack-prevention-for-the-home-user-how-to-prevent-a-cyber-attack</link>
				<description>By Tony M. Damico - Consider the difference between network intrusion prevention and network detection systems. Prevention systems &amp;ldquo;automatically detect and block malicious network and application traffic, while allowing legitimate traffic to continue through to its destination&amp;rdquo; (Top Layer, 2008). A detection system may detect suspicious activity, but where is the protection from fast acting attacks? A prevention system must identify and stop malicious attacks before they do damage and have a chance to infect a system. As the Top Layer article indicates, &amp;ldquo;[The prevention system] must operate with...</description>
				<pubDate>Fri, 13 Nov 2009 11:36 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/47/cyber-attack-prevention-for-the-home-user-how-to-prevent-a-cyber-attack</guid>
			</item>
			<item>
				<title>A Vulnerable Network: Undersea Internet Cable Attacks</title>
				<link>http://www.inquiriesjournal.com/articles/44/a-vulnerable-network-undersea-internet-cable-attacks</link>
				<description>By Tony M. Damico - Conversely, one could argue that with more cables being laid, some redundancy will occur so that the increased number of undersea cables will ensure greater continuity in times of cable breakdown.  In any event, protecting these cables has become more of a hot topic after theses attacks. The idea that submarines may carry men close enough to the cables to cut or otherwise damage them brings other goals to mind. A possibility exists that during the downtime of the cables, monitoring devices may be attached to gain some amount of unrestricted access to the transmissions running through the cable...</description>
				<pubDate>Wed, 11 Nov 2009 05:35 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/44/a-vulnerable-network-undersea-internet-cable-attacks</guid>
			</item>
			<item>
				<title>A Brief History of Cryptography</title>
				<link>http://www.inquiriesjournal.com/articles/1698/a-brief-history-of-cryptography</link>
				<description>By Tony M. Damico - As early as 1900 B.C., Egyptian scribes used hieroglyphs in a non-standard fashion, presumably to hide the meaning from those who did not know the meaning (Whitman, 2005). The Greek&amp;rsquo;s idea was to wrap a tape around a stick, and then write the message on the wound tape. When the tape was unwound, the writing would be meaningless. The receiver of the message would of course have a stick of the same diameter and use it to decipher the message. The Roman method of cryptography was known as the Caesar Shift Cipher. It utilized the idea of shifting letters by an agreed upon number (three was a...</description>
				<pubDate>Tue, 10 Nov 2009 11:34 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1698/a-brief-history-of-cryptography</guid>
			</item>
	</channel>
</rss>
