Information Security Requires Fresh Approaches

MacNeil, Dennis
June 2007
Database Trends & Applications;Jun2007, Vol. 21 Issue 6, p8
The article discusses how threats coming from inside the organization inflicts more damage than threats coming from outside the organization. It explains how employees with broader system privileges can be a threat by having authorized access to sensitive data more than they need to do their job. It also discusses how outsiders, not necessarily hackers, can also be called as a threat inside the organization by explaining the possibility of associated people or organizations can have access to an organization's data. It also discusses some solutions to the problems like internal controls by assigning boundaries or scopes of an employee, a well made security policy, the need to reduce the costs of these solutions and its adaptability to changes.


Related Articles

  • Data Administrators: Protecting Customers' Privacy. Schumacher, Scott // Certification Magazine;Sep2007, Vol. 9 Issue 9, p26 

    The article discusses the problems with electronic communications and electronic data sharing and the need for a customer data integration (CDI) solutions to ensure data privacy and security. Privacy and security issues are engendered by the growing bulk of electronic data, the proliferation of...

  • Secur(e/ity) Management: A Continuing Uphill Climb. Hale, John; Brusil, Paul // Journal of Network & Systems Management;Dec2007, Vol. 15 Issue 4, p525 

    With ever growing and evolving threats and cyber attacks, the management of enterprise security and the security of enterprise management systems are key to business—if not a nation's—operations and survival. Secur(e/ity) management, the moniker for the intertwined topics of secure...

  • Meter Data Management: Important but too Expensive? Bonnett, David // Electric Light & Power;May/Jun2008, Vol. 86 Issue 3, p48 

    The article discusses the effectiveness of meter data management (MDM). It stresses that MDM systems are significantly less expensive to implement as compared to enterprise solutions. It notes that MDM can minimize the need for in-house information technology staff. Moreover, it emphasizes that...

  • Security as a Service Delivers Total Protection. Day, Greg // Database & Network Journal;Apr2008, Vol. 38 Issue 2, p19 

    The article reports on the importance of managed security packages for SMBs. It is stated that small and medium sized organisations are already investing heavily in a range of managed IT services. They are driven by a need to reduce management time and cost. Tagged as "security as a service",...

  • Threat of information theft grows for employees who work remotely. Esola, Louise // Business Insurance;5/21/2007, Vol. 41 Issue 21, p18 

    The article addresses the growing threat of information theft. According to experts, it is all too easy for information thieves seeking to exploit personal data. Therefore, companies are looking for ways to protect sensitive data. Threats to other devices-BlackBerries, personal digital...

  • Crack Your Own Passwords, Boost Security. Bradley, Tony // PCWorld;Mar2011, Vol. 29 Issue 3, p34 

    The article offers advice about improving computer security through passwords. It advises computer users to not base passwords on personal information and words that are found in the dictionary. Those with passwords are encouraged to use tools that an attacker may use to determine passwords and...

  • Teenager hacks his way to academic glory.  // Computer Weekly;2/12/2008, p44 

    The article reports that a 16-year-old boy in Great Britain has gained a qualification as an ethical hacker, which, in the words of the course creator, demonstrates there is no minimum age limit at which someone can qualify. It is reported that the student is said to be the youngest person on...

  • A New Security Model. GARDNER, PHIL; SILVA, CHRIS // Information Security;Sep2011, Vol. 13 Issue 7, p8 

    The author reflects on the importance of a new data security which may address the growing threat of hackers, who steal data for money or to cause a very specialized form of chaos for organizations they dislike or find easy to penetrate. He mentions that these hackers are well-trained and...

  • A DBA Primer to SOX Compliance. Devraj, Venkat S.; Dawson, Robert // Database Trends & Applications;Nov2006, Vol. 20 Issue 11, p11 

    The article focuses on the Sarbanes-Oxley law (SOX) compliance. SOX requirements emphasize on the assessment of the internal controls wherein information technology (IT) has the main role in enabling the organizations to fulfil their compliance goals. The IT managers' main areas of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics