TITLE

safety zone

AUTHOR(S)
Hilderbrand, Carol
PUB. DATE
September 2006
SOURCE
PM Network;Sep2006, Vol. 20 Issue 9, p28
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses methods of identify theft and offers suggestions on how to protect information systems. The commonly applied techniques in identify theft include phishings, spyware and social engineering. It is recommended that companies should encrypt and authenticate their data for security purposes. The author suggests that firms should also test and check the effectiveness of their security measures. INSETS: watch thy partner;required reading.
ACCESSION #
22543582

 

Related Articles

  • THE FIGHT AGAINST IDENTITY THEFT.  // Consumer Reports;Jun2005, Vol. 70 Issue 6, p5 

    Focuses on identity theft and how consumers can protect themselves against it. How companies that hold sensitive personal information are failing to protect it from hackers; Need for stronger legislation related to identity theft; Three things that the Consumers Union is trying to accomplish in...

  • iDENTITY FRAUD.  // Finweek;6/17/2010, Special section p4 

    The article offers information about identity fraud or theft. It indicates that identity fraud is an attempt to get sensitive information including names, passwords and credit card details. According to Jayson O'Reilly, identity thieves and hackers are targeting home computers due to less or...

  • Limits of token gestures. King, Stuart // Computer Weekly;4/4/2006, p22 

    This article presents views of the author on computer security. Although the author does not advocate providing a blood sample to enable him to log into his bank account from home, he likes the idea of his bank providing him with an extra form factor and using two-factor authentication. No...

  • Who's Got My Keys? Sparks, John // Newsweek (Atlantic Edition);11/28/2005 (Atlantic Edition), Vol. 146 Issue 22, p6 

    The article focuses on identity-stealing software programs known as keyloggers, which are easy to make from online kits. Keyloggers install themselves onto computers without users' knowledge, recording keystrokes as the user types in passwords, account numbers and personal data. Identity theft...

  • Who's Got My Keys? Sparks, John // Newsweek;12/19/2005, Vol. 146 Issue 25, pE2 

    The article focuses on identity-stealing software programs known as keyloggers, which are easy to make from online kits. Keyloggers install themselves onto computers without users' knowledge, recording keystrokes as the user types in passwords, account numbers and personal data. Identity theft...

  • Who's Got My Keys? Sparks, John // Newsweek (Pacific Edition);11/28/2005 (Pacific Edition), Vol. 146 Issue 22, p6 

    The article focuses on identity-stealing software programs known as keyloggers, which are easy to make from online kits. Keyloggers install themselves onto computers without users' knowledge, recording keystrokes as the user types in passwords, account numbers and personal data. Identity theft...

  • EFFICIENT METHOD FOR SECURELY MANAGING PASSWORDS. TANVEER, ASMA; KHAN, AIHAB; KHIYAL, MALIK SIKANDER HAYAT; HUSSAIN, SYED AFAQ // Journal of Theoretical & Applied Information Technology;4/30/2011, Vol. 26 Issue 2, p69 

    A password is a secret string that is used for security and authentication purposes and to provide access to a resource. Therefore it is more vulnerable to attacks such as hacking, phishing, identity theft, Cyber stalking and website cloning. But it is difficult for humans to remember large no...

  • Identity Theft Still A Growing Problem.  // Business Communications Review;May2007, Vol. 37 Issue 5, p6 

    The article discusses research that took place between 2003 and 2006 concerning identity theft. According to Gartner, identity theft has increased by more than 50 percent in that three year span, costing the average victim $3,257 in 2006, compared to $1,408 in 2005. Victims are also recovering...

  • How to Secure Your Online Communications. Dock, Patti // Advisor Today;Apr2009, Vol. 104 Issue 4, p68 

    The article offers tips to secure online communication against identity theft and fraud. Financial advisors are advised to use secure encryption to ensure the integrity of the information and to prevent hackers from hacking the information. They are suggested to secure external workflow...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics