TITLE

M&A Surge Jeopardizes Sensitive Data

AUTHOR(S)
Sisk, Michael
PUB. DATE
December 2008
SOURCE
Bank Technology News;Dec2008, Vol. 21 Issue 12, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the jeopardy of data security in the U.S. Data protection will become even more difficult when two banks work together in such a way mergers usually result in layoffs that tempt affected employees to take advantage of any security lapse. Each network has to be revamped to provide information technology personnel with a complete view of all the networks to locate the best pathways to connect the networks, while assuring security of assets.
ACCESSION #
36084251

 

Related Articles

  • Cyber Threats May Be Hazardous to Your Privacy. Raduege Jr., Harry D. // Policy & Practice (19426828);Apr2009, Vol. 67 Issue 2, p24 

    The article discusses the risks brought by cyber on the security of the private information kept by human services professionals and sectors in the U.S. The Commission on Cybersecurity fir the 44th Presidency has submitted a report regarding the impact of cyber threats on public and private...

  • Threat Assessment.  // Network Dictionary;2007, p486 

    A definition of the term "Threat Assessment" is presented. It refers to the identification of types of threats that an organization might be exposed to.

  • Math foundations fortify networks, safeguard personal communications. Coffee, Peter // PC Week;06/16/97, Vol. 14 Issue 24, p107 

    Explores the principles that protect sensitive data on computer networks. The foundational nature of network security; Authentication; Integrity; Confidentiality; Access control. INSET: Reference corner: Network security, K. Walters..

  • Management of Security and Security for Management Systems. Westphall, Carlos; Mueller, Peter // Journal of Network & Systems Management;Sep2010, Vol. 18 Issue 3, p241 

    An introduction to the journal is presented in which the editor discusses an article on network security schemes that use traffic redistribution techniques to become more robust against attacks, a description of the normal behavior of computer networks that are based on Support Vector Data...

  • Security Domains: Key Management in Large-Scale Systems. Michener, John R.; Acar, Tolga // IEEE Software;Sep/Oct2000, Vol. 17 Issue 5, p52 

    Describes the use of a security domain (SD) method in dealing with logical keying structures for data protection in large-scale computer systems. Comparison on the use of public and private key systems to implement a communication system; Assumptions and requirements for the SD method;...

  • BRAINSTORM.  // Wireless Design & Development;Mar2009, Vol. 17 Issue 3, p24 

    The article provides answers to a question on what data security threats will be most common in 2009 and tools that are available today to protect company networks.

  • UTMs becoming universal. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Mar2013, Vol. 24 Issue 3, p31 

    The article introduces a series of articles on unified threat management (UTM) systems.

  • The new security battle plan. Gaspar, Suzanne // Network World;9/30/2002, Vol. 19 Issue 39, p43 

    Focuses on the importance of data protection for network policy. Network security calls for protecting data; Enforcement of the access to information; Investigation on the effectiveness of the effort through internal traffic monitoring.

  • No Pulp Fiction. Cohen, Suzanne I. // Risk Management (00355593);Jun2001, Vol. 48 Issue 6, p7 

    Risk managers recognize the importance of retaining vital records, but they may underestimate what could happen if they fail to use the proper methods to destroy sensitive materials. Identity-theft statistics are staggering. Corporations must factor in the unwelcome opportunity cost that leaking...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics