TITLE

Strategies for Sharing and Protecting Sensitive Information

AUTHOR(S)
Price, Elaine
PUB. DATE
October 2003
SOURCE
Financial Executive;Oct2003, Vol. 19 Issue 7, p50
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article discusses the strategies for sharing and protecting important business information. The author notes that the protection of confidential information is extremely important for businesses for a variety of reasons such as retaining customer trust, maintaining competitive advantage and avoiding various legal matters that can arise if confidential information is leaked. The author notes that because of the Sarbanes-Oxley Act disclosure of certain information has become necessary; however, making sure that it is done in a structured manner is just one of the responsibilities falling on the shoulders of chief financial officers. The author also provides a list of some of the security measures that can be taken to avoid various types of information theft.
ACCESSION #
11060406

 

Related Articles

  • New Construction of Efficient Hierarchical Identity Based Signature in the Standard Model. He Liu; Sijia Wang; Mangui Liang // International Journal of Security & Its Applications;Jul2013, Vol. 7 Issue 4, p211 

    In this paper, we propose a new efficient hierarchical identity based signature (HIBS) scheme. Our scheme can be proven probably secure based on a natural hardness assumption (i.e. h-exponent computational diffie-hellman problem (h-CDH)) in the standard model. Our scheme only requires three...

  • BUILDING A SECURE ENTERPRISE MODEL FOR CLOUD COMPUTING ENVIRONMENT. Srinivasan, Meena // Academy of Information & Management Sciences Journal;2012, Vol. 15 Issue 1, p127 

    Security is a major concern for enterprises and a good information security framework is essential for the continued success of enterprises that use cloud computing services with vendors. The ISO/IEC 27002 security standard is based on a management systems approach and is the choice of many...

  • Application Layer Security Issues and Its Solutions. Raghavendra, K.; Nireshwalya, Sumith // International Journal of Computer Science Engineering & Technolo;Jun2012, Vol. 2 Issue 6, p1266 

    Every layer of communication has its own unique security challenges. The application layer communication is a very weak link in terms of security because that the application layer Application Layer security is a growing area of concern for developers, designers, quality assurance specialist and...

  • Application Layer Security Issues and Its Solutions. Raghavendra, K.; Nireshwalya, Sumith // International Journal of Computer Science Engineering & Technolo;Jun2012, Vol. 2 Issue 6, p1266 

    Every layer of communication has its own unique security challenges. The application layer communication is a very weak link in terms of security because that the application layer Application Layer security is a growing area of concern for developers, designers, quality assurance specialist and...

  • The Devil is in the Microcode. Price, Andrew // ITNOW;Dec2011, Vol. 53 Issue 6, p32 

    Today's coders are more designing rather than writing real code, says Andrew Rice of HP Information Security.

  • Secure Software. Niblett, Gareth // ITNOW;Dec2011, Vol. 53 Issue 6, p25 

    Welcome to Information Security Now (ISNOW) in its new home in ITNOW. Since security and IT are often inseparable neither should be ignored, says Gareth Niblett chair of BCS ISSG.

  • Special Publicly Verifiable Secret Sharing Scheme for LEO Satellite Networks. Liu Xiao-Yue; Tian You-Liang; Ma Jian-Feng; Xiao Zhu // International Journal of Digital Content Technology & its Applic;Nov2011, Vol. 5 Issue 11, p378 

    Security and privacy in satellite networks are an important and active research area. A number of challenges are arisen due to the limited computational, storage and communication abilities of typical satellite networks. This work describes a simple and inexpensive a special publicly verifiable...

  • Risk Analysis of Inter Base-station Dynamic Resource Sharing in IEEE-802.22 MAC Layer Protocol. Shaukat, Rakhshanda; Khan, Shoab Ahmed // International Journal of Digital Content Technology & its Applic;Nov2011, Vol. 5 Issue 11, p60 

    Security is always a key concern for the networks. This paper concentrates on security threats of Inter Base-station Dynamic Resource Sharing, one of the key features of IEEE-802.22. This paper has identified weak spot related to channel release requests during resource sharing process and has...

  • The Cost of Doing the Right Thing.  // Information Security;Jun2010, Vol. 12 Issue 5, p8 

    The author discusses the aspects of what it would take to do things successfully in terms of computer security. He agrees with the process of changing company computer practice through new structure, policies and rules to be able to bring about real change. Also discussed is the article...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics