Getting CERT-ified: Teams Thwart Viruses

O'Connell, Brian
September 2004
Bank Technology News;Sep2004, Vol. 17 Issue 9, p13
Trade Publication
Reports on the formation of Computer Emergency Response Teams (CERT) by financial organizations to prevent computer hackers and computer viruses in the banks computer infrastructure. Qualifications to be a member of the CERT team; Training and sessions undergone by the CERT team members; Responsibilities of CERT team leaders.


Related Articles

  • Benchmark to Market Perimeter Service. Wade, Will // American Banker;1/26/2005, Vol. 170 Issue 17, p16 

    This article reports that the branch automation provider Benchmark Technology Group Inc. of Alpharetta, Ga., has agreed to offer to its customers a cyberattack defense service from Perimeter Internetworking Corp. of Trumbull, Conn. Perimeter monitors data traffic between a bank's network and the...

  • A Method to Incorporate Negative Value into a Trust Model. Azimzadeh, F.; Khatum, S.; Ali, B. M. // International Review on Computers & Software;Mar2007, Vol. 2 Issue 2, p190 

    Trust is an important issue for security. Trust issues influence not only the specification of security policies but also the techniques needed to manage and implement security policies for systems. Certification is one of the main components trust models. Traditional trust model did not...

  • Viruses: New Strains, new solutions. Hickman, James R. // ABA Banking Journal;Jan1995, Vol. 87 Issue 1, p49 

    Provides information on the solutions for the virus problem encountered by banks. Abilities of an anti-virus product; Abstinence as the best means of prevention.

  • Back Orifice is back and it's badder than ever. Schwartau, Winn // Network World;08/02/99, Vol. 16 Issue 31, p35 

    Reports on the launching during the 1999 Def Con of the Back Orifice 2000 virus by the Cult of the Dead Cow (CDC), an organization of computer hackers. Revelation of the lack of security in Windows NT and other Microsoft products; Prevention of computer viruses; Plans to sue CDC.

  • Why can't hackers us their talents to make better that which isn't perfect? Politis, David // Enterprise/Salt Lake City;9/01/2003, Vol. 33 Issue 10, p11 

    Comments on the potential role of computer hackers in improving society. Need for the assistance of the U.S. Department of Homeland Security in detecting computer hackers; Possible contribution of hackers to technological and medical innovations; Suggestions that hackers should develop programs...

  • Phishing for Twitter security.  // Communications News;Mar/Apr2009, Vol. 46 Issue 3, p6 

    The article offers tips on how users prevent phishing on social networking sites. It recommends to stop the virtual popularity contest because it provides opportunities for would-be attackers to spread viruses. It suggests not to click on links received unexpectedly and never log in to a site...

  • Cyberspace invaders.  // Consumer Reports;Jun2002, Vol. 67 Issue 6, p16 

    Offers suggestions on how to stop computer hackers and computer viruses. Freedom that hackers have on the Internet; How viruses, or malicious software, can disrupt or damage home computers; The web site launched by the National Cyber Security Alliance addressing computer security; Using a...

  • IGNORE AT YOUR OWN RISK. Mimoso, Michael S. // Information Security;Dec2006, Vol. 9 Issue 12, p27 

    The article reports on the high priority that information security managers place on the prevention of virus and worm infections according to the "2007 Priorities Survey," conducted by the periodical "Information Security." The lack of virus and worm activities reflect the advances in automated...

  • The virus hunters. Waller, Dave // Management Today;Dec2010, p98 

    The article discusses the nature and ways to protect and treat computer viruses. It states that it is easy for hackers to do control to another machine, operate someone's webcam, log keystrokes and steal passwords. It mentions that the biggest virus threat in 2010 is Stuxnet which targets...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics