TITLE

DISASTER PROTECTION FOR FINANCIAL DATA

AUTHOR(S)
Sagner, James S.
PUB. DATE
December 2001
SOURCE
Financial Executive;Dec2001, Vol. 17 Issue 9, p62
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article discusses measures firms can take to protect financial data. Conceal laptop computers within, say, a gym bag rather than an easily recognizable laptop case. Corporate networks should be equipped with security and encryption technology. Back up data to floppy diskettes whenever new data are entered.
ACCESSION #
11927796

 

Related Articles

  • 9 Steps To Halt Data Branches. Calder, Alan // Database & Network Journal;Feb2009, Vol. 39 Issue 1, p13 

    The article explains nine steps to prevent data breaches in Great Britain. The Information Technology Governance Data Breaches Report identifies that data breaches are not caused by the misdemeanor of an employee but arise from the systematically inadequate information security arrangements at...

  • Let the Hacking Begin! Amato-McCoy, Deena M. // Chain Store Age;Jul2007, Vol. 83 Issue 7, p60 

    The article encourages retailers to review and tighten their contingency preparations surrounding their own internal wireless networks. Tests surrounding internal and external encryption, firewalls and virtual private networking could make all the difference between thwarting a hack, or falling...

  • Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES).  // International Journal of Computer Applications;2010, Vol. 1, p65 

    The article offers information on the elliptic curve cryptography (ECC) and its relevance in encryption scheme. It mentions the ECC's effectiveness in such scheme and cites its better performance compared to its remote secure access (RSA) counterpart. It cites its importance in dealing with...

  • Going Online to Save Data Safely. Goldsborough, Reid // Black Issues in Higher Education;11/18/2004, Vol. 21 Issue 20, p45 

    Presents an article about data protection. Significance of saving important data offsite; Use of a specialized online backup service; Encryption of files.

  • Protecting the unprotected. Oltsik, Jon // Storage Magazine;Sep2004, Vol. 3 Issue 7, p62 

    The article addresses the storage security issue in corporate laptops. While terrorist threats, regulatory compliance and security have ignited the data protection market, there remains a dramatically underserved piece of information infrastructure: corporate laptops. The Enterprise Strategy...

  • Juniper expands security lineup. Hines, Matt // eWeek;10/9/2006, Vol. 23 Issue 40, p27 

    The article reports that Juniper Networks Inc. has expanded its Secure Services Gateway appliance lineup by adding three management tools to remote business location in the U.S. The devices help to block malware and other menaces coming from corporate networks. SSG 5 and SSG 20, two of the...

  • Contingency Access to Encrypted Data. McLees, Todd // Software World;May2006, Vol. 37 Issue 3, p11 

    The article discusses the contingency access to encrypted data. Requirements for data protection and accessibility including data accessibility and recoverability of all stored and transferred data and data security against accidental loss, destruction or damage and unlawful processing are...

  • Do You Encrypt Your Backup Tapes?  // Storage Magazine;Aug2003, Vol. 2 Issue 6, p14 

    Highlights the practice of storage security companies in encrypting backup tapes. Encryption of backup tapes; Reasons for not encrypting backup tapes.

  • Security start-ups offer new brands of protection. Messmer, Ellen // Network World;1/26/2004, Vol. 21 Issue 4, p21 

    Presents an update on the new products for security start-ups in the network industry. Role in protecting network-based attacks and stopping outbound transmission of sensitive date; Highlights of BeadWindow 100, the intrusion-prevention and firewall application from BeadWindow; Challenge of...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics