TITLE

Fight next security war

AUTHOR(S)
Lundquist, Eric
PUB. DATE
May 2005
SOURCE
eWeek;5/23/2005, Vol. 22 Issue 21, p26
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on computer security. According to the author, in the future security will be treated as a service by the internal technology staff or purchased via subscription from an outside provider. The days of piecemeal security upgrades and client to client scrambles are quickly coming to an end. Pushing the security model upstream away from the client to a hosted solution is good news for companies with a strong host-based business such as telecommunications, hosted e-mail and even hosted search companies. Cyota, a company in the anti-fraud space, boasts some of the largest banks as clients. With anti-fraud and user authentication much in the news, it is refreshing to find a company that is applying business and human intelligence to the issue rather than broadly calling for massive identification programs that probably create more problems than are solved. The solution to computer security problems will not come in one quick event but will be the result of sustained effort that whittles down the openings available to online criminal
ACCESSION #
17134856

 

Related Articles

  • Standards Aim to Improve Computer Security. Costlow, Terry // IEEE Software;Sep/Oct2005, Vol. 22 Issue 5, p113 

    This article presents information related to computer security. Computer security lapses by banks and credit card companies get the headlines. A growing number of companies have begun adopting the ISO 17799 security standard, also known as BS 7799. Originally developed in Great Britain, it saw...

  • Computing insecurity. Gonsalves, Chris // eWeek;5/23/2005, Vol. 22 Issue 21, p32 

    The article focuses on computer security. A computer virus Trojan sits quietly on an infected machine until a user authenticates to an online banking site with a token. The authentication prompts the Trojan to action, where it opens a background session with the user's online banking site,...

  • Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24 

    This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...

  • An Usage-Centric Botnet Taxonomy. Czosseck, Christian; Podins, Karlis // Proceedings of the European Conference on Information Warfare & ;2011, p65 

    Botnets have been a recognized threat to computer security for several years. On the timeline of malware development, they can be seen as the latest evolutionary step. Criminals have taken advantage of this new technol-ogy and cyber crime has grown to become a serious and sophisticated problem...

  • FIVE CRITICAL ELEMENTS OF SECURITY REMAIN RELEVANT TODAY. Coffee, Peter // Baseline;Aug2007 Supplement, p23 

    The article offers information about the five critical elements of security relative to technology. Some of the viruses that have widely infected millions of computers in the U.S. are elaborated including the Nimda worm, Slammer worm and Sober worm. To improve the security of electronic...

  • Dirty dozen spam-retaying countries.  // Database & Network Journal;Feb2007, Vol. 37 Issue 1, p24 

    The article reports on the top twelve spam-relaying countries identified by Sophos PLC in its Security Threat Report 2007. The U.S. remains to be at the top of the list of worst spam-relaying countries. The other countries included in the spam-relaying statistics are China including Hong Kong,...

  • USB Devices Unveiled.  // Database & Network Journal;Aug2006, Vol. 36 Issue 4, p22 

    The article reports on the condition of universal serial bus (USB) devices, being susceptible to virus. According to the author, reports of the style data theft and comprise are becoming more of threat every day. Once one of the USB devices are plugged in computers, becomes trivial to merely...

  • Coalesce Model to Prevent Format String Attacks. Shekhar, Jayant; Yadav, Seema; Ahmad, Khaleel // International Journal of Computer Science Issues (IJCSI);May2011, Vol. 8 Issue 3, p427 

    Format string attacks cause serious security problems in the field of software security in computer world. Testing and implementation against to Format String vulnerabilities can avoid result due to working of Format String Bugs. In this paper, we have proposed eight novel approaches to prevent...

  • Enterprise Security Strategy. Ali Pabrai, Uday O. // Certification Magazine;Nov2003, Vol. 5 Issue 11, p48 

    Offers tips on implementing an enterprise security strategy. Increase in hacker sophistication and speed of attacks; Ways to counter cyber crimes; Strategic objectives for business security.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics