TITLE

Security Sense

PUB. DATE
February 2003
SOURCE
Management Services;Feb2003, Vol. 47 Issue 2, p31
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Websense has launched a database category that blocks spyware programs from sending potentially sensitive data back to marketer servers. The category, which is included in the Websense Premium Group III database, helps information technology managers prevent spyware from compromising corporate data security and draining valuable corporate bandwidth.
ACCESSION #
11511135

 

Related Articles

  • IT employee risks.  // Management Services;Dec2003, Vol. 47 Issue 12, p31 

    The article reports on the release of version 5.1 of the flagship Websense Enterprise software of Websense, as part of its employee Internet management solutions work. This latest version extends user benefits realized through real-time, user friendly reporting, broadened deployment options,...

  • Managing data protection and client information systems. Jenkins, Peter // CPJ: Counselling & Psychotherapy Journal;Feb2005, Vol. 16 Issue 1, p44 

    The article presents the author's views on the Data Protection Act 1998 of Great Britain. The Data Protection Act 1998 has had a huge, and still largely uncharted, impact on counselling practice over the first four years of its active life. Regulating manual records for the first time, as well...

  • Information Security -- the new challenges. Philpott, Don // Homeland Defense Journal;Nov2007, Vol. 5 Issue 11, p44 

    The article provides information concerning the new challenges in information security in the U.S. From a federal/civil view, the author infers that information security has a little bit of the intelligence community component and a whole lot of the law enforcement component. Another component...

  • Familiarity with information security management system. Nakhaie, Hamid; Zadeh, Asma Esmail // International Proceedings of Economics Development & Research;2011, Vol. 13, p349 

    It seems that various organizations with regard to the importance of their current information role need to a strong management to preserve the security of this information. Information security refers to information conservation and minimization of illegal access to them. Information security...

  • The Power of Discretion in IS Security. Samonas, Spyridon; Angell, Ian O. // Journal of Information System Security;2010, Vol. 6 Issue 2, p3 

    This paper emphasizes the central role of discretion in organizations, and its importance for understanding Information Systems (IS) security. By way of an introduction to the relevant research field of power and IS security, a brief overview of the literature on power, IS and security is...

  • A System Dynamics Model of Information Security Investments. Behara, Ravi S.; Huang, C. Derrick; Qing Hu // Journal of Information System Security;2010, Vol. 6 Issue 2, p30 

    Information security management has become an increasingly serious and high-stake challenge to organizations, due to growing reliance on the Internet as the business platform, the intrinsic vulnerability of Internet technologies, and the increasing value of information stored in information...

  • ISO 17799: "BEST PRACTICES" IN INFORMATION SECURITY MANAGEMENT? Qingxiong Ma; Pearson, J. Michael // Communications of the Association for Information Systems;2005, Vol. 15, p577 

    To protect the information assets of organizations, many different standards and guidelines have been proposed. Among them, International standard ISO 17799 is one of the most prominent international efforts on information security. This standard provides both an authoritative statement on...

  • Pay Attention to State Legislation. Pike, George H. // Information Today;Jun2003, Vol. 20 Issue 6, p17 

    Analyzes the impact of related state legislation in the U.S. to the information sevices industry. Purpose of the Uniform Computer Information Transactions Act; Limitations to the government set by the Electronic Government Services Act; Proponents of the Model Communications Security Legislation.

  • Description of a Practical Application of an Information Security Audit Framework. Pereira, Teresa; Santos, Henrique // Proceedings of the European Conference on Information Warfare & ;2011, p315 

    Organizations are increasingly relying on information systems to enhance business operations, facilitate management decision-making, and deploy business strategies. This dependence has increased in current business environments where a variety of transactions involving exchange of information...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics