Network Security Threats Require Diverse Protection

Joshi, Abhay
November 2004
Bank Technology News;Nov2004, Vol. 17 Issue 11, p62
Trade Publication
The article informs that network security threats require diverse protection. Financial institution must tackle network security from several directions, defending against malicious attacks while considering everything from regulatory compliance to proactively protecting revenue generating on-line applications. If critical online resources are left unprotected, the result of an attack can be catastrophic. The Denial of Service or Distributed Denial of Service attack is typically directed against critical online resources such as on-line banking or on-line customer service servers.


Related Articles

  • Processing More Securely at a Fast Pace. Garritano, Anthony // National Mortgage News;10/3/2007 Convention Special Editin, Vol. 32 Issue 2, p24 

    The article reports on the launching of data security which is an encrypted network providing encryption while maintaining to process high-volume transactions by Zoot Enterprises, a provider of instant credit decisioning and loan origination solutions in the U.S. The launching was due to...

  • Biz Backs Biometrics. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p30 

    The article focuses on the interests of the experts in the security industry in the silicon chip fingerprint sensor market in the U.S. It is believed that silicon chip sensors have finally come of age. Silicon fingerprint participants have carved their niche in wireless applications and are...

  • Sub-optimum Analysis and Trusted Network. Zengtang Qu; Ping He // Proceedings of the International Symposium on Information Proces;2009, p290 

    The paper describes sub-optimum method for trusted computing models of network security. trusted computing of network security is performed under both optimum and non-optimum learning. The task of selection is done using a knowledge-based network under sub-optimum degree learning. The...

  • EXECUTIVES RANK CRITICAL SECURITY ISSUES.  // CRN;6/28/2004, Issue 1102, p59 

    Presents the top network security concerns of an organization according to employees who have responsibility for network security.

  • Changes in American Banker Affect Online Database.  // Information Today;Feb1990, Vol. 7 Issue 2, p6 

    This article reports on the changes in the content and format of American Banker in February 1990. These changes will be reflected in the full-text electronic version as new column and section headings. The changes in the print edition, based on market research conducted by Booz, Allen and...

  • Enterprise security is fraying at the edges.  // MarketWatch: Technology;Jul2007, Vol. 6 Issue 7, p16 

    The article focuses on the issue of information security management particularly in the online industry. In many organizations, a great deal of sensitive data marks as the lifeblood of their operations. Putting these information in the web might expose it to risk considering that the Internet is...

  • MANAGED SECURITY GETS A MAKEOVER. Wilson, Carol // Telephony;11/3/2008, p32 

    The article focuses on the evolving managed security services which move up to value chain for better corporate data and content protection. It notes that managed services of today deals with higher customer expectation in the level of protection. Doug Howard, chief strategy officer of Perimeter...

  • Bankers giving the finger to network security. Fontana, John // Network World;8/21/2006, Vol. 23 Issue 32, p14 

    The article reports on Daren Mehl, the assistant vice president of technology for the United Banker's Bank (UBB) in Bloomington, Minnesota, who has deployed fingerprint readers which are being used by employees and UBB affiliates to securely log into online resources locally and over the...

  • Computer Security Industry.  // U.S. Black Engineer & Information Technology;Summer2010, Vol. 34 Issue 3, p54 

    The article provides information about the computer security industry. It provides the definition of the terms information security, integrity, and availability of information. It also features the scope of the information security policy. It mentions brief information about cyber security...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics