What You Need to Know about IT and IT Security

Kakish, David
July 2007
Security: Solutions for Enterprise Security Leaders;Jul2007, Vol. 44 Issue 7, p40
Trade Publication
The article reports on the breaches in information technology (IT) systems among U.S. industries that demand physical and IT security. It was reported that the systems controlling commercial and industrial facilities and identity management were exposed to transgressions like embezzlement or fraud. Security officers were carrying out technologies like surveillance video for Internet Protocol (IP) networks, smart card and biometrics information systems and security department databases.


Related Articles

  • Attacking Malicious Code: A Report to the Infosec Research Council. McGraw, Gary; Morrisett, Greg // IEEE Software;Sep/Oct2000, Vol. 17 Issue 5, p33 

    Discusses various aspects concerning the increasing problem of malicious code in information systems. Examples of malicious code; List of trends that contributed to the spread of malicious code; Techniques for code analysis; Principles for designing security policies; Defense methods and...

  • 10 information security lessons we learned from audit executives in 2014. VAN DER OORD, FRISO; SHAIKH, RUTH // Directors & Boards;2015 Annual Report, Vol. 39 Issue 4, p22 

    The article presents the 10 information security lessons in 2014 from audit executives. Topics discussed include several lessons, which include technical security controls' fallacy, critical role of employees, and difference between risks prevention and detection. Also mentioned are competitive...

  • Mobile Device Privacy and Security: A 21st-Century Challenge. LaVoy, Lanse E. // Cutter Benchmark Review;Jun2010, Vol. 10 Issue 6, p12 

    In this article the author discusses the current level of information technology (IT) power and the adoption of mobile technologies. He takes a deeper scrutiny at IT security for the mobile landscape and explains how the challenge of securing IT resources is changing together with the emergence...

  • Mobile Privacy and Security: Still Far from Mission Accomplished. Piccoli, Gabriele // Cutter Benchmark Review;Jun2010, Vol. 10 Issue 6, p17 

    The article discusses the author's views on the impact of security and privacy on mobile communication systems. He adds to Lanse LaVoy's point that the intrinsic value of mobile platforms like smartphones lies in the concept of freedom, security, and safety from any constraints. The author...

  • KURUMSAL BÄ°LGÄ° GÃœVENLİĞİ ve MUHASEBE BÄ°LGÄ° SÄ°STEMÄ°. Alagöz, Ali; Allahverdi, Metin // Muhasebe ve Vergi Uygulamalari Dergisi (MUVU) / Journal of Accou;2011, Vol. 4 Issue 3, p47 

    Improvements in information and communication technologies cause the present information that agencies and institutes have to reach to the enormous amount. Besides, development of information technologies have increased the usage of internet. This case leads to important risks for systems, which...

  • JRMAD METODO PANAUDOJIMAS TAIKANT INFORMACINIŲ TECHNOLOGIJŲ SAUGOS POLITIKÄ„. Švedaitė, Eglė // Science: Future of Lithuania;2011, Vol. 3 Issue 1, p29 

    Analyzing the flexible uses security problems in existing information technology systems. Looking for way to ensure the safety of the reaction time to smooth access to more projects in development. Review of projects undertaken. Codified in the project design and development components. Made of...

  • The art of this war is changing. Armstrong, Illena // SC Magazine: For IT Security Professionals (15476693);Oct2011, Vol. 22 Issue 10, p4 

    The author reflects on the need to strengthen existing security and risk management through people, technology, and process. She cites that information technology security operations cannot just rely on hardware and software upgrades, but should be driven by the organization as it adapts to the...

  • All about the data. Grimes, Roger A. // NetworkWorld Asia;Nov2007, Vol. 3 Issue 10, p40 

    The article offers tips on how to secure information technology infrastructure and storage system in data-centric approach. According to the author, the different efforts made by various companies to secure its security systems has only one objective which is to protect information integrity....

  • Is open source Snort dead? Depends who you ask. Messmer, Ellen // Network World;7/26/2010, Vol. 27 Issue 14, p10 

    The article discusses the replacement of Snort with Suricata 1.0 from the Open Information Security Foundation in the U.S. It mentions some features of Suricata that make it better than Snort in providing information security. Furthermore, it points out the views of Martin Roesch, Snort creator,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics