Identity theft is a widely reported problem in today's world. Criminals can use numerous ways to obtain private information such as Social Security Numbers, credit card details, and other information that makes it possible for the perpetrator to successfully "pretend to be" someone else. A similar concept, albeit less personal, is so-called IP Spoofing, wherein fake IP datagrams can be generated and sent across the network in order to compromise remote systems in a variety of ways. Farha Ali gives an overview of IP Spoofing and explains ways in which the problem can be mitigated.
Our second article looks at numerous standards for information security management being developed by organizations such as the International Organization for Standardization (ISO), the National Institute of Standards and Technology (NIST), and others. The author of the article is William Stallings.
On November 2, 2007, Vint Cerf ended his term as chairman of the Internet Corporation for Assigned Names and Numbers (ICANN). At the same time he released a document entitled "Looking Toward the Future," which details ICANN's history, as well as outlining its challenges ahead. We've included the document in this issue and added some pointers for those readers who may not be familiar with the workings of ICANN.
In late October, the Internet technical community received the sad news that Dr. Junichiro Hagino, universally known as "Itojun" had passed away. Itojun played a very important role in the development of IPv6 and had many friends across the world. We asked one of them, Bob Hinden, to reflect on Itojun's life and compile some comments from those who knew him well.
We would like to remind you about our online adjunct to this journal. The Internet Protocol Forum (IPF) available at http://www.ipjforum.org/ is a resource you can use to discuss articles and read additional material. Please take a moment to explore IPF.
—Ole J. Jacobsen, Editor and Publisher