TITLE

What Really is Suspicious Activity?

AUTHOR(S)
Jones, Duane
PUB. DATE
April 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p48
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the concept of suspicious activity in computer systems and describes methods for chief security officers and employees to detect such activities. The article notes the importance of understanding what constitutes suspicious activity and what indicates suspicious activity. Training employees to recognize and report suspicious activities could deter terrorist organization operational activities.
ACCESSION #
31658163

 

Related Articles

  • What's the Price of Outsourcing? Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p44 

    The article reports on the implications of having an electronic employment verification (EEV) system in the U.S. According to a Cato Institute study, the EEV is ineffective, intrusive and expensive. It notes that implementing a full-fledged EEV has many practical and technical problems and would...

  • Vigilant Computer Agents Protect The Homeland.  // Electronic Design;8/23/2004, Vol. 52 Issue 18, p8 

    The Oak Ridge National Laboratory dispatches thousands of agents on a search for threats to national security in the U.S. While these agents maintain 24 hours and 7 days vigilance, they are not elite government operatives. They are software programs that scan the Internet, satellite images, and...

  • Integrated approach includes information security. Wood, Charles Cresson // Security: Solutions for Enterprise Security Leaders;Feb2000, Vol. 37 Issue 2, p43 

    Discusses the importance of a written information security policy in every organization especially with growth of the Internet and electronic commerce. Sample topics that should be included when creating an information security policy document; Purposes served by an information security policy....

  • Untitled. Ashford, Warwick // Computer Weekly;1/22/2008, p54 

    The article reports that LogicaCMG PLC has contracted with the company Arcot to launch a software-based two-factor authentication system in Europe. The software has been developed by Arcot based on LogicaCMG's existing Assure's authentication platform. It is reported that software two-factor...

  • HOMELAND SECURITY FOCUS. McHale, John // Military & Aerospace Electronics;Mar2005, Vol. 16 Issue 3, p20 

    Reports developments related to the homeland security and management in the U.S. Creation of Additional Seattle to the U.S. Department of Homeland Security's Regional Technology Integration initiative; Supply of the U.S. military with 14 portable walk-through metal detectors for the elections in...

  • Consistency Adds to Access Effectiveness. Dingle, Jeffrey // Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p52 

    The article reports on the implications of an access control system. Access control varies from specifically controlling access to assuring that people entering a facility do not have weapons or explosives. The U.S. government has developed an access control system that requires positive...

  • CLASSIC, MODERN, AND POST-MODERN APPROACHES TO MAKING SECURITY STRATEGY. Tagarev, Todor; Ivanova, Petya // Proceedings of the International Conference on Information Techn;2009, Vol. 1, Special section p7 

    The article describes classic, modern and post-modern approaches to making security strategy. Security strategy is defined in the article as the art and science of developing, applying, and coordinating the instruments of national power to achieve national security objectives. The challenges of...

  • The Detection Selection.  // Information Security;Feb2006, Vol. 9 Issue 2, p32 

    Highlights the eTrust Intrusion Detection system from CA. Performance capabilities of the product; Key control features; Applications of the detection tool.

  • As Printers Diverge.  // Security: Solutions for Enterprise Security Leaders;Nov2005, Vol. 42 Issue 11, p28 

    Focuses on the significance of ID card systems. Popularity of ID card systems in several companies and school; Divergence of card printer; Approximated number of card printer manufacturers worldwide. INSET: Member Cards Add Credibility.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics