Network Security: As the Worms Turn

Marshall, Jeffrey
December 2003
Financial Executive;Dec2003, Vol. 19 Issue 9, p49
Academic Journal
This article presents an examination of the security measures needed to be taken by corporations to protect their computer networks from the attacks of computer hackers. The author provides examples of some of the more common names given to worms and other computer viruses as well as the views of information security experts over the increase in incidents of computer attacks. The author also outlines some of the methods recommended to anticipate and block computer viruses. The author adds that while cost is an issue that financial executives tend to focus on, this cannot be their main objective when dealing with an information technology security program. While costs are certainly part of the equation, the author suggests that having confidence in a security program is invaluable.


Related Articles

  • Internet Security: You Don's Get What You Pay For. Millman, Gregory J. // Financial Executive;Dec2003, Vol. 19 Issue 9, p51 

    This article presents a discussion over the importance of companies investing in Internet security programs. The author provides the results of a survey organized by the Computer Security Institute in 2003 that shows that a great deal is still unknown about the actual financial costs associated...

  • how to stay connected. Hickman, Thomas // Strategic Finance;Sep2002, Vol. 84 Issue 3, p32 

    This article discusses the importance of comprehensive data protection in a company's disaster recovery plan. The author notes that with employees increasing using PCs and laptops to perform their work, their is also an increasing need for server backup to recover from information losses due to...

  • Security for Next-Generation Voice and Video: Know Your Network. Boone, Adam // Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p38 

    The article offers the author's insights on unified communications (UC) in information technology (IT) security. He says that the distribution of UC includes the replacement communication networks such as closed circuit video systems. He cites advantages of the UC such as the reduced costly...

  • Security Issues Rise As Automation Gains. Marshall, Jeffrey; Heffes, Ellen M. // Financial Executive;Oct2005, Vol. 21 Issue 8, p12 

    The article discusses a report pertaining to information security exposure and information technology (IT) infrastructure. The report indicates that the rate of information security exposure is growing at small businesses as they deploy increasingly sophisticated IT infrastructure and automate...

  • Border Crossings in the Identity Realm. DEUBY, SEAN // Windows IT Pro;Apr2011, Vol. 17 Issue 4, p14 

    The author discusses ways in which digital authorization and authentication systems are patterned after methods used in the physical world. Similarities between a driver's license and a Kerberos ticket used in Active Directory authentication and authorization or a Security Assertion Markup...

  • The Evolving Security Paradigm in An Increasingly Mobile World.  // PC Quest;Jun2012, p14 

    The article provides information on how to manage security at the network level to help businesses protect their networks and users. It mentions that information technology (IT) departments can worry less about ignored alerts or weak passwords by transferring security into the network. It states...

  • IT security is even more important in a recession. McLean, Michael R. // New Hampshire Business Review;7/3/2009, Vol. 31 Issue 14, p19 

    The article focuses on the importance of information technology (IT) security in a recession. It cites the need for data in a company to be protected, and employees to be knowledgeable and security-conscious. According to the article, information security breaches could have a huge impact on the...

  • Security Convergence - The Future can be found in the Past. Elliott, David // Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p68 

    The article offers the author's insights on physical security and information technology (IT) security. He says that the physical security and IT security cannot be combined due to the decentralization of computing resources and the Voice Over Internet Protocol (VoIP). He cites that the two will...

  • So You've Been Breached? NOW WHAT? Rock, Jeremy // Hospitality Upgrade;Summer2010, p40 

    The article discusses how to strengthen data security systems and operational policies and procedures to avoid data systems security breach. It offers advice about obtaining assistance such as hiring a certified Forensic Assessment Firm, a certified Qualified Security Assessor (QSA), and an...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics