TITLE

Taking E-Security To A Higher Level

AUTHOR(S)
McCarthy, Mary Pat; Campbell, Stuart
PUB. DATE
December 2001
SOURCE
Financial Executive;Dec2001, Vol. 17 Issue 9, p50
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article discusses how firms can protect themselves against data theft. Each year breaches in security cost firms almost $15 billion. Digital security should therefore rank prominently among a chief executive officer's risk-management concerns. A comprehensive approach to security includes appropriate technology and people trained to use it. Firms need to realize that, while employees can be a source of security risk, a properly trained staff can also be a bulwark against it. Security measures should focus not just on preventing data breaches, but also detecting and responding to them.
ACCESSION #
11927790

 

Related Articles

  • Prevent, Detect and Respond: Intrusion Detection Systems. Pabrai, Uday O. Ali // Certification Magazine;Mar2003, Vol. 5 Issue 3, p27 

    Focuses on the features and functions of intrusion detection systems (IDS) designed to prevent attacks on an enterprise infrastructure. Types of attacks commonly reported by an IDS; Ways in which the attacks can be launched; Kinds of information that the attacks can provide to the attacker.

  • Moore's Outlaws. TALBOT, DAVID // Technology Review;Jul/Aug2010, Vol. 113 Issue 4, p36 

    The article discusses recent episodes of cyber crime, espionage, and warfare. One such incident involved Eugene Kaspersky, the chief executive officer (CEO) of the Russian antivirus company Kaspersky Lab, who witnessed a cyber attack caused by a virulent computer worm called Conficker. It is...

  • Real Training for Real Life. Stroberger, Michael // Security: Solutions for Enterprise Security Leaders;Jan2007, Vol. 44 Issue 1, p52 

    The article discusses training as the most fundamental fact in the electronic security industry. It explains that training specifics are mandated by law and in some cases, common sense prevails. However, some basic theories must be taken into account, if the process is to be effective, efficient...

  • Integrated approach includes information security. Wood, Charles Cresson // Security: Solutions for Enterprise Security Leaders;Feb2000, Vol. 37 Issue 2, p43 

    Discusses the importance of a written information security policy in every organization especially with growth of the Internet and electronic commerce. Sample topics that should be included when creating an information security policy document; Purposes served by an information security policy....

  • Bugged by Spyware?  // Software World;Jan2004, Vol. 35 Issue 1, p18 

    Reports on issues concerning security systems in the computer industry. Information about spyware, term given to software that gets installed without the users permission; Impact of the spyware program on the computer industry; Tips for dealing with spyware problems.

  • Intrusion Prevention: A Better Way To Spot Trouble? Robinson, Brian // Securities Industry News;6/6/2005 Supplement, Vol. 17, p25 

    Discusses the advantages and disadvantages of the introduction of the intrusion prevention (IP), a system that detects and automatically addresses security threats to computer networks. Description of the IP system; Differences between IP and intrusion detection system; Factor to consider in...

  • Vigilant Computer Agents Protect The Homeland.  // Electronic Design;8/23/2004, Vol. 52 Issue 18, p8 

    The Oak Ridge National Laboratory dispatches thousands of agents on a search for threats to national security in the U.S. While these agents maintain 24 hours and 7 days vigilance, they are not elite government operatives. They are software programs that scan the Internet, satellite images, and...

  • Untitled. Ashford, Warwick // Computer Weekly;1/22/2008, p54 

    The article reports that LogicaCMG PLC has contracted with the company Arcot to launch a software-based two-factor authentication system in Europe. The software has been developed by Arcot based on LogicaCMG's existing Assure's authentication platform. It is reported that software two-factor...

  • The business of utilising an IDS. Wilson, Andrew // SC Magazine: For IT Security Professionals (UK Edition);Jul2004, p34 

    The article considers the use of intrusion detection technology as a security measure from malicious attacks. Detective controls operate to reduce the impact of a security breach once it has occurred, or is in the process of occurring. Intrusion detection and intrusion detection systems (IDS)...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics