TITLE

Risk Management 101

AUTHOR(S)
Mullen, John
PUB. DATE
August 2008
SOURCE
Best's Review;Aug2008, Vol. 109 Issue 4, p116
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on the on the impact of information theft to various companies in the U.S. To prepare for such incident to happen, it is vital for companies to have a risk management strategy. Identifiable information of customers such as Social Security numbers, dates of birth, customer account information can be used by computer hackers in performing various computer crimes.
ACCESSION #
33985993

 

Related Articles

  • FIVE CRITICAL ELEMENTS OF SECURITY REMAIN RELEVANT TODAY. Coffee, Peter // Baseline;Aug2007 Supplement, p23 

    The article offers information about the five critical elements of security relative to technology. Some of the viruses that have widely infected millions of computers in the U.S. are elaborated including the Nimda worm, Slammer worm and Sober worm. To improve the security of electronic...

  • Vigilantes on the net. Moran, Barbara // New Scientist;6/12/2004, Vol. 182 Issue 2451, p26 

    There are ways to make the Internet safer, better education for home computer users and less vulnerable software. When laws fail and enforcement won't work, desperate citizens may be tempted to take matters into their own hands. Computer security has entered the world of counterstrike software,...

  • Hacker tracker.  // CRN;6/6/2005, Issue 1150, p48 

    The article focuses on computer security in relation to various ways in which a computer hacker hacks a computer. One of the computer security software's "Coldfusion MX" fixes cross-site scripting vulnerability. A cross-site scripting vulnerability was discovered in ColdFusion MX's error page...

  • The Morning After Zero-day. Sengupta, Smita Lala // Dataquest;1/15/2014, Vol. 32 Issue 1, p16 

    The article discusses the serious threat of zero-day attack detected in a suspicious sample targeting the Microsoft Office by anti-virus and anti-spyware software protector McAfee Inc.'s Advanced Exploit Detection System (AEDS) in October 2013. It states the zero-day vulnerability brings threat...

  • A Compelling Argument For Automated Code Testing. Schmidt, Howard A. // Software World;Jul2008, Vol. 39 Issue 4, p14 

    The article discusses the importance of automated code testing to software companies in Great Britain. Due to the rising cases of internet fraud, malware, computer hacking and computer viruses, companies are looking for ways to address and mitigate the detrimental effects of such events. It...

  • Security as a Core Business Strategy. Scheuble, Dan // Accounting Today;10/16/2006, Vol. 20 Issue 19, Special section p18 

    This article offers information on several options on how an executive team can approach the issue of security. An executive team can choose to do nothing, hoping that the problem is overblown and the firm will not be targeted by cyber-criminals. They can invest in a set of basic security...

  • Data Secured? Taking on Cyber-Thievery. O'Rourke, Morgan // Risk Management (00355593);Oct2005, Vol. 52 Issue 10, p18 

    This article discusses a recent increase in the number of data security breaches in the U.S., as of October 2005. Despite increased awareness, the recent frequency of breaches seems to indicate that many companies have not adequately responded to the issue of data security within their...

  • Security and Risk: The Stakes Just Keep Getting Higher.  // CIO Insight;Special Issue 62, p41 

    The article focuses on the continued effort of information technology (IT) companies to combat information security risks and deflect computer hackers. Careless and employee behavior were considered as major security risks and improving them will improve the corporate safety. In order to address...

  • Infosecurity Europe 2006: Cyber extortion is now a very real threat - is your business at risk?  // Database & Network Journal;Feb2006, Vol. 36 Issue 1, p8 

    The article focuses on the threat posed by cyber extortion to businesses. One of the most destructive method used by criminals is the Distributed Denial of Service attacks. It crashes the company's web site or server attacking them with data in the form of web request or e-mails. Recently, these...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics