TITLE

Think Beyond the Laptop 'Box'

AUTHOR(S)
Tuvell, George
PUB. DATE
February 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Feb2007, Vol. 44 Issue 2, p74
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article suggests that laptop computers should be furnished with security measures. Laptops serves as an extension of office computers and this requires an actual standard of data protection should be observed to prevent any unauthorized access to the database system and other important information. According to the author, business productivity lies on the security measure of the company and to achieve this company must install anti-virus, message filtering and other protective software. INSET: Protect those Ports.
ACCESSION #
24041046

 

Related Articles

  • Development of Security System for Operating Secure FMC. DaeHee Seo; Jang-Mi Beak; Byung-Mo Kang; ByungGil Lee; In-Sik Hong // Journal of Security Engineering;Jun2012, Vol. 9 Issue 3, p261 

    According to the recent increase in data services, knowledge, emotion, entertainment, convenience and variety of experience to deliver value to customers is changing. To meet these needs, the network has become increasingly intelligent and integrated. The communications environment according to...

  • People and Processes Outweigh Technology in Effective Government Information Security.  // International Journal of Micrographics & Optical Technology;2007, Vol. 25 Issue 1/2, p7 

    The article provides information on the 2006 Global Information Security Workforce Study, conducted by analyst firm IDC. The report states that the U.S. government's efforts to improve its overall security position through compliance with stringent information security mandates is increasing the...

  • THE GREAT PRIORITY PUZZLE. Samani, Raj // Computer Weekly;4/15/2008, p24 

    The article presents the author's views on information security. The author thinks that compliance, security and operability are interlinked risk objectives for an organisation. According to the author, more regulation and greater reliance on internet will drive security demand. It is stated...

  • Image Based Authentication Using Steganography Technique. Sonker, Satish Kumar; Kumar, Sanjeev; Kumar, Amit; Singh, Pragya // International Journal of Advanced Research in Computer Science;May/Jun2013, Vol. 4 Issue 3, p277 

    In the world of Information Security we are generally using Traditional (Text based) or multi factor Authentication Approach. Through which we are facing a lot of problems and it's also less secure too. In these types conventional method attacks like brute-force attack, Dictionary Attack etc.,...

  • Professional Monitor.  // SC Magazine: For IT Security Professionals (UK Edition);May/Jun2012, p42 

    The article discusses cyber security and the role of the (ISC)² EMEA Advisory Board. Entities like governments and the academe usually defer to national professional bodies when consulting about cyber security. The purpose of the Advsory Board is to support the international professional...

  • Got something to say? Fisher, Matt; Hargreaves, Roger; Hardy, David // SC Magazine: For IT Security Professionals (UK Edition);Feb2007, p24 

    Several letters to the editor are presented in response to articles published in previous issues, including the security threat posed by the iPhone and the articles "Brave New World" and "Private Matters" which both appeared in the January 2006 issue.

  • Server Virtualization: Powerful Tool, Extra Exposure. Trombly, Maria; Cacho, Lemuel V. // Securities Industry News;3/24/2008, Vol. 20 Issue 12, p12 

    The article discusses the security threats of server virtualization. Though server virtualization brings down cost and improves efficiency of existing hardware, it exposes information systems to data breach, as multiple virtual machines share common communication lines. Strategies to remedy...

  • The need and the challenge. Mark, Chris // SC Magazine: For IT Security Professionals (15476693);Feb2014, Vol. 25 Issue 2, p46 

    The article discusses issues related to computer security, including the differences in how security professionals define security. It is noted that in the absence of a definition of security, industries have established regulation and compliance mandates or recommendations. It also cited why...

  • InfraGard.  // Network Dictionary;2007, p244 

    A definition of the term "InfraGard" is presented. It refers to a cooperative effort for protecting critical information security infrastructures in the U.S.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics