TITLE

NEWS MAKERS

PUB. DATE
August 2006
SOURCE
Bank Technology News;Aug2006, Vol. 19 Issue 8, p8
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on developments relevant to bank security systems in the U.S. in 2006. Key issues discussed include the contactless PayPass feature of MasterCard credit and debit cards, the slight increase in bank fraud incidents and the limits of Citibank's multi-factor security system against computer fraud.
ACCESSION #
22005831

 

Related Articles

  • Breach At RSA Security May Threaten Bank Systems. Quittner, Jeremy // CardLine;3/25/2011, Vol. 11 Issue 12, p9 

    The article reports on a potential threat to thousands of banks which use EMC Corp.'s RSA Security due to a security breach. RSA's technology is used by several banks to secure access to online banking and other systems. According to experts, the breach demonstrates a weakness of passcode...

  • Prevent, Detect and Respond: Intrusion Detection Systems. Pabrai, Uday O. Ali // Certification Magazine;Mar2003, Vol. 5 Issue 3, p27 

    Focuses on the features and functions of intrusion detection systems (IDS) designed to prevent attacks on an enterprise infrastructure. Types of attacks commonly reported by an IDS; Ways in which the attacks can be launched; Kinds of information that the attacks can provide to the attacker.

  • What's Wrong With Security? Martin, Elizabeth // Information Security;Nov2011, Vol. 13 Issue 9, p8 

    The article presents ways of improving information security. For security managers who lack personnel to address concerns, the author suggests finding a way for senior management to realize the need for security from botnets and online fraud. Security engineers who do not have support for...

  • The Shaky State of Security. Roberts, Paul F. // InfoWorld;7/26/2004, Vol. 26 Issue 30, p32 

    This article reveals the results of an online survey on computer security systems of business enterprises in the U.S. in June 2004. The picture that emerged from a poll of more than 600 information technology professionals in the survey was one of wariness in the face of a wide range of threats,...

  • A New Ecology Model for Internet Worm Security Threat Evaluation. Wang XiaoPeng; Wang Bailing; Liu Yang; He Hui; Sun Yunxiao // International Journal of Future Generation Communication & Netwo;Apr2013, Vol. 6 Issue 2, p107 

    Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. They created complex worm interactions as well as detrimental impact on infrastructure. Worm propagation analysis, including exploring mechanisms of predator-prey worms' propagation and formulating effects...

  • Only 500 People in the World Understand Security. Nass, Richard // Design News;Aug2013, Vol. 68 Issue 8, p12 

    The author discusses several factors to consider when thinking about industrial control system security. He says that before security properties, it is essential to look at the safety of people in the industrial setting. He adds that updating computer software such as Adobe Acrobat is important...

  • Computer crimes, problems, Law enforcement for solving complaints and education. Fariborzi, Elham; Hajibaba, Mahnaz // International Proceedings of Computer Science & Information Tech;2012, Vol. 43, p19 

    Today, computer crimes are increasing in different countries. Computer crime is an illegal act which is done by a computer. Considering the extent and complexity of computer crime in cyberspace, and using different tools in this space for doing the crime made different the conditions of dealing...

  • Coalesce Model to Prevent Format String Attacks. Shekhar, Jayant; Yadav, Seema; Ahmad, Khaleel // International Journal of Computer Science Issues (IJCSI);May2011, Vol. 8 Issue 3, p427 

    Format string attacks cause serious security problems in the field of software security in computer world. Testing and implementation against to Format String vulnerabilities can avoid result due to working of Format String Bugs. In this paper, we have proposed eight novel approaches to prevent...

  • The numbers speak for themselves. Tullett, Jon // SC Magazine: For IT Security Professionals;May2004, p16 

    This article reports on the survey Information Security Breaches Survey 2004, which was conducted by PricewaterhouseCoopers for Great Britain's Department of Trade and Industry. In 2002, 29 percent of companies surveyed expected to experience more security breaches, but this year 54 percent...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics