TITLE

Perimeter Security Leaves The Crown Jewels At Risk

AUTHOR(S)
Howard, Matthew
PUB. DATE
June 2005
SOURCE
Business Communications Review;Jun2005, Vol. 35 Issue 6, p60
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the need of mini-perimeters defenses in order to enhance information security of enterprises. Enterprise strategies continue to focus on perimeter defenses. About 80 percent of corporate security breaches begin from inside the castle. With corrupt or careless employees putting electronic corporate assets at risk, companies need to rethink security, literally from the inside out. Today's businesses operate as part of a persistently connected global grid and a huge amount of their intrinsic value can be reduced to tiny bits and bytes that easily slip through a growing variety of electronic cracks. Intellectual property which used to fill multiple file cabinets now fits on an easily concealed optical disc or USB memory stick. Similarly, wireless technologies and handheld devices have spread like weeds. A recent study out of Michigan State University subjected 1,037 actual identity theft cases to forensic analysis and found that as many as 70 percent began with an employee stealing personal data from work.
ACCESSION #
17296710

 

Related Articles

  • Portable storage devices can pose a security threat, warn analysts.  // SC Magazine: For IT Security Professionals (UK Edition);Aug2004, p9 

    Devices like MP3 players might seem innocuous enough, but every time users connect them to enterprise networks, they could be putting companies at risk. According to a study from Gartner, portable storage devices like USB flash drives and MP3 players allow users to introduce malicious malware to...

  • DrayTek Vigor 2800VG.  // APC (Bauer Media Group);Jul2005, Vol. 25 Issue 7, p75 

    Evaluates the modem Vigor 2800VG from DrayTek. Utility of the USB port on the back of the modem; Simplicity of the user interface; Benefits of firewall compatibility.

  • How to Build a Safe, Secure Network. Miastkowski, Stan // PCWorld;May2004, Vol. 22 Issue 5, p180 

    This article presents steps on the installation of secured computer networks. Computers must be turn off and unplug from the wall. Owners must wear an antistatic wrist strap to avoid static damage. If they find a free peripheral component interface slot, they remove the slot cover, insert the...

  • Fighting the new breed of security threat. King, Paul // Computer Weekly;11/15/2005, p64 

    The article focuses on information security. High-capacity digital storage devices, such as the USB thumbdrives, home broadband connections with virtual private network and the threat of malware are all mechanisms by which thieves can get their hands on data. Spyware can make its way into a...

  • Security Think Tank: Physical security should be replicated in cyber world.  // Computer Weekly;8/29/2013, p1 

    The article discusses physical security in the cyber world wherein the old techniques of protecting the information and intellectual property of a user are still effective. It states that the modern operating systems has a firewall and a demilitarised zone (DMZ) for the installment of email...

  • NHT Launching Multiple New Speakers. Palenchar, Joseph // TWICE: This Week in Consumer Electronics;10/18/2010, Vol. 25 Issue 21, p40 

    The article reports on the 2011 first quarter launch of NHT's B10d and B12d high-output powered wireless subwoofers, which feature Universal Series Bus (USB) ports that accept optional wireless adapters.

  • Security News and Products.  // Database & Network Journal;Oct2006, Vol. 36 Issue 5, p21 

    The article offers several news briefs regarding computer security. msystems' has claimed that its mTrust is a complete business solution that converts USB flash drives into corporate assets to improve employee output and flexibility under strict information technology (IT) control. Avanquest U....

  • Fighting the USB Threat to Corporate Data. Szerszen, Dennis // Database Trends & Applications;Feb2006, Vol. 20 Issue 2, p22 

    The article examines the role of Universal Serial Bus (USB) in becoming a potential source of computer security breaches. USB is a device that protects information stored on the database. With the use of USB port, computer users can transfer or copy data to and from other computers with less...

  • Security. Clark, David // IEEE Internet Computing;Jul/Aug2002, Vol. 6 Issue 4, p17 

    Presents abstracts of several articles on computer security. 'Databases Under Fire,' by Rik Farrow; 'SNMP's Real Vulnerability,' by Lenny Liebmann; 'Security and 802.11 Wireless Networks,' by Steve Steinke.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics