Playbook Basics: Building Your Offense

Novoa, Manny
March 2005
Security: Solutions for Enterprise Security Leaders;Mar2005, Vol. 42 Issue 3, p44
Trade Publication
Reports on the cyber threats faced by businesses in shifting to digital, mobile and virtual operations in the U.S. Total amount lost by U.S. banks a result of unauthorized access to checking accounts; Need for businesses to focus on ways to secure their operations from both internal and external security threats; Importance of developing a security program that educate employers and employees on the vulnerabilities digital technologies.


Related Articles

  • the week in IT.  // Computer Weekly;10/5/2010, p3 

    The article offers news briefs related to Information Technology (IT). The computer worm, Stuxnet, which is considered to be the world's first cyber weapon, hits computers in China. Police arrests 19 people of an international computer crime gang, Zeus Trojan, that has stolen millions of pounds...

  • Cooperative Defence against DDoS Attacks. Guangsen Zhang; Parashar, Manish // Journal of Research & Practice in Information Technology;Feb2006, Vol. 38 Issue 1, p69 

    Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) cannot detect them accurately. As a result, defend DDoS attacks based on current available IDS...

  • Security threats increase demand for protection. Savvas, Antony // Computer Weekly;4/20/2004, p51 

    The information technology (IT) industry calls for security standard for business continuity. The threat of attacks has fuelled the market for IT security professionals. With internet security attacks on the increase and events such as the BT cabling tunnel fire in Manchester, IT security and...

  • Cyber Security Directed Activities. Pacek, Bogusław // Internal Security;Jul-Dec2012, Vol. 4 Issue 2, p117 

    Together with the development of new information technologies it is necessary to take actions the aim of which is to provide protection of ICT (information and communications technology) systems. Cyber security is mainly ensured by suitable systems with the installed software for counteracting...

  • CYBERCRIME PREVENTION IN THE KINGDOM OF BAHRAIN VIA IT SECURITY AUDIT PLANS. ALMADHOOB, AMNA; VALVERDE, RAUL // Journal of Theoretical & Applied Information Technology;7/10/2014, Vol. 65 Issue 1, p274 

    Implementing cybercrime preventing technologies is critical in today's connected world. As companies continue to rely on critical infrastructure, they should also address the risk and threats imposed by the use of these technologies. Bahrain is no different from anywhere else in the world when...

  • High-tech crime unit for Scotland moves into gear. Rogers, James // Computer Weekly;2/27/2003, p10 

    Reports on the possibility for the working of Scotland's high technology crime unit to help police force to stop internet crime. Types of the crimes tackled by the unit; Recruitment of the staff for the unit; Description of the work done by the unit; Finance provided by the Scottish executive...

  • Don't fear e-terror hype. Simpson, Pete // Computer Weekly;4/26/2005, p22 

    In this article the author presents his views on the expected threat of cyber terrorism. Since the September 2001 terrorist attacks in the U.S., countries have been warned of cyber attacks against power systems, air traffic control, emergency services, banking and communications. According to...

  • Watching Our Backs. Udell, Jon // InfoWorld;9/25/2006, Vol. 28 Issue 39, p44 

    The article discusses the advantages of the human capability to memorize visual and auditory patterns and notice deviations from them in relation to detecting a cyberattack. Even computer security professionals know that there is no defense against a determined attacker. The presumption that...

  • Lessons from the Cyber Trenches. Sharick, Paula // Windows IT Pro;Oct2004, Vol. 10 Issue 12, p41 

    Focuses on the steps taken by an information technology (IT) professional in fighting against network intruders. Adjustments made by the IT professional in determining the purpose of server exploitation; Use of Microsoft Baseline Security Analyzer in securing the web server; Configuration of the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics