Security Strategy

Bain, Craig E.; Fisher, Cheryl
December 1986
FE: The Magazine for Financial Executives;Dec1986, Vol. 2 Issue 12, p38
Trade Publication
Provides advice on how companies can evaluate their future computer security needs. Areas to be covered when assessing a company's security system; Data classification; Sensitivity marketing; Backup procedures; Use of control passwords; Employee selection.


Related Articles

  • Computer Crime. Parker, Donn // FE: The Magazine for Financial Executives;Dec1986, Vol. 2 Issue 12, p33 

    Discusses the security issue for corporate databases as computer literacy increases and computer crime rises. Losses from an average computer crime; Changes which have affected the technology side of the problem; Kinds of loss that a business can suffer due to computer crime; Concepts of...

  • HOW STRONG IS YOUR SAFETY NET?  // Financial Executive;Mar/Apr97, Vol. 13 Issue 2, p47 

    The article presents a discussion on information technology controls. The authors contend that small companies have several misconceptions regarding the need for security measures. Barbara Bashein, an expert in the field, states that 70% of firms in her study lost working hours because of a...

  • Protecting Guest Data. O'Dell, Cait // Hospitality Upgrade;Fall2011, p144 

    The article explores the significance of data protection as a proactive approach to business security. It notes that business have using such approach following the growth of computer hacking and other related cybercrimes. It suggests that data protection includes vulnerability scanning, one of...

  • IMPROVING CYBER SECURITY ON A LIMITED BUDGET. Brown, Richard; Ryckman, Mark // Public Management (00333611);Nov2010, Vol. 92 Issue 10, p27 

    The article provides tips for local government managers to manage and implement cyber security measures on a limited budget. It advises managers to educate the organization about the importance of cyber security by putting policies on computer usage, installing a firewall, and regularly running...

  • The Shaky State of Security. Roberts, Paul F. // InfoWorld;7/26/2004, Vol. 26 Issue 30, p32 

    This article reveals the results of an online survey on computer security systems of business enterprises in the U.S. in June 2004. The picture that emerged from a poll of more than 600 information technology professionals in the survey was one of wariness in the face of a wide range of threats,...

  • Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective. Huigang Liang; Yajiong Xue // Journal of the Association for Information Systems;July2010, Vol. 11 Issue 7, p394 

    This study aims to understand the IT threat avoidance behaviors of personal computer users. We tested a research model derived from Technology Threat Avoidance Theory (TTAT) using survey data. We find that users' IT threat avoidance behavior is predicted by avoidance motivation, which, in turn,...

  • PREVENTING COMPUTER FRAUD. Hanna, Greg // Strategic Finance;Mar2005, Vol. 86 Issue 9, p31 

    The article discusses ways of preventing computer fraud. Research indicates that 75% of computer crimes are committed within an organization. Among the security measures experts recommend are firewalls, vulnerability-scanning tools, and an aunthentication of user names and passwords....

  • IT Security Trends: A Look Ahead to 2010. Eich, Mark A. // Illinois Banker;May2010, Vol. 95 Issue 5, p13 

    The article presents various issues that needs the attention of the information technology (IT) in 2010. One is to look for the attackers that develop methods to breach systems as companies are adopting marketing strategies that rely on social networking sites. Another is to look for hackers to...

  • Another Obstacle for Hackers to Scale. Wine, Elizabeth // Treasury & Risk Management;Jun2005, Vol. 15 Issue 6, p13 

    Explains that two-factor authentication looks more cost-effective as computer theft rises. Example of DataPipe, a privately held Web hosting and IT outsourcing company based in Hoboken, New Jersey; Use of a physical token, a small plastic device with a screen display that flashed a password or...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics