TITLE

UNUSUAL BEHAVIOR IS ON THE RADAR AT FIRST CITIZENS

PUB. DATE
December 2005
SOURCE
Bank Technology News;Dec2005, Vol. 18 Issue 12, p28
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the use of behavior-based systems to secure customer data from unauthorized access. Most of the computer-based consumer data thefts are committed either by employees working for the firms or by fraudsters posing as legitimate customers. Percept, a platform from Covelight Systems, is used by Raleigh to audit employee and customer-level use of Web applications in order to safeguard customer data from potential fraud. Percept creates user profiles benchmarked to what has been typical usage among customers and employees. In case of breach of the benchmark, the behavior-based programs alert the administrators or security managers.
ACCESSION #
19738012

 

Related Articles

  • THE POLL.  // SC Magazine: For IT Security Professionals (UK Edition);Dec2006, p11 

    The article reports on the results of a survey related to information security. Sixty five percent of workers in Great Britain admit they have considered taking data, such as sales leads and business contacts, when they leave the company and nearly two thirds admitted stealing data. £22.5...

  • Ironclad IT and legal protection is vital for flex. White, Peter // Employee Benefits;Dec2003, p07 

    Reports on the prevalence of online fraud and identification theft and its implications for the online administration of employee benefits in Great Britain. Provisions of the Data Protection Act of 1998; Protection of personal information; Security systems. INSET: Data Protection Act 1998.

  • Upgrade to Suite B security algorithms. Lattin, Bill // Network World;5/25/2009, Vol. 26 Issue 20, p21 

    The article presents the factors that companies should consider in choosing the level of cryptography for information security. It is recommended that companies should analyze the required level of cryptography to assess the value and sensitivity of the data. Other steps to consider include...

  • for employers -- background checking. Langton, Natasha // ITNOW;Mar2005, Vol. 47 Issue 2, p18 

    Focuses on the importance of conducting employee background checks to ensure information technology security within a company. Results of a survey of the practice of employee background checking by employers in Great Britain; Reason behind the growth of the outsourcing of pre-employment...

  • Panda Security Reports Most Studied Remittance PCs Infected, Exposed. RAPPORT, MARC // Credit Union Times;1/7/2009, Vol. 20 Issue 1, p21 

    The article presents information on the study conducted by an information technology (IT) security provider, Panda Security on security threat for businesses that send remittances. The study found that businesses involved in sending remittances back to immigrants' home lack in security measures...

  • ChoicePoint's MARI Enhances Anti-Fraud Database.  // National Mortgage News;9/24/2007, Vol. 31 Issue 51, p22 

    The article reports on the release of the first phase of a series of enhancements to its Mortgage Industry Data Exchange anti-fraud database by the Mortgage Asset Research Institute in the U.S. It is a national database used by members of the mortgage industry to report incidents of mortgage...

  • AN ANALYSIS OF THE GROWTH OF COMPUTER AND INTERNET SECURITY BREACHES. Bagchi, Kallol; Udo, Goodwin // Communications of the Association for Information Systems;2003, Vol. 12, p684 

    This study uses the modified Gompertz model and sparse data to analyze the growth rates of different types of computer and Internet-related crimes. The Gompertz model is an appropriate diffusion model because it is capable of modeling two opposite behaviors: (1) acts of attacks and imitation of...

  • Time for data breach disclosure? Fisher, Matt // Data Strategy;Aug2009, Vol. 6 Issue 8, p12 

    The author asserts that the British government must pass a bill requiring the full disclosure of all data breaches to the public. He cites the reasons for the lack of importance given to data protection, such as people's lack of understanding of the risk associated with customer data. He...

  • LOCKING IT DOWN.  // SC Magazine: For IT Security Professionals;Aug2005, p31 

    This article provides tips on protecting personal data from phishers and identity thieves. Unless there is a specific reason that personal information is being stored, dispose of it. If data needs to be there, set a timetable for its length of stay and when it can be disposed of. Make sure that...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics