TITLE

Sense of Security

AUTHOR(S)
Bernstel, Janet Bigham
PUB. DATE
April 2000
SOURCE
Bank Marketing;Apr2000, Vol. 32 Issue 4, p29
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Provides information on the importance for customers to trust their financial institution when dealing with online security. Use of the Secure Socket Layer, which protects data during transmission; Significance of educating staff about security.
ACCESSION #
3845297

 

Related Articles

  • A Five-Step Process to Help You Prepare for an E-Banking Examination.  // Bank Security Report;Sep2012, Vol. 41 Issue 9, p6 

    The article presents a five-step examination preparation program for financial institution's electronic-banking. This five-step process can be used as the starting point for developing or updating security readiness plan. Some of the steps include checking data connections and transmission to...

  • Low Color-Depth Image Encryption Scheme for use in COTS Smartphones. DOUKAS, NIKOLAOS // WSEAS Transaction on Systems;Sep2012, Vol. 11 Issue 9, p527 

    Cyber security and privacy are sources of increasing importance for the successful deployment of information and communication technology. This paper investigates aspects concerning privacy during the communication of low color depth images in encrypted form via low bit-rate, error prone...

  • The privacy conundrum.  // ITNOW;Mar2008, Vol. 50 Issue 2, p18 

    The article discusses the concepts and language of privacy. It notes that problem of data control is due to individuals who are lazy with data sharing and sloppy. It notes that there are always risks to data security as information systems being developed paid little attention to security and...

  • Enhancing the Communication Channel Through Secure Shell And Irrational DES. Krishna, S. R. M.; Jamwal, Paradeep Singh; Priya, K. Padma; Vishnu, P. Hema // International Journal on Computer Science & Engineering;2011, Vol. 3 Issue 3, p1020 

    As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry to less sophisticated user over a broad spectrum.most data transfer are...

  • Engineering Privacy. Spiekerman, Sarah; Cranor, Lorrie Faith // IEEE Transactions on Software Engineering;Jan/Feb2009, Vol. 35 Issue 1, p67 

    In this paper, we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First, we discuss privacy requirements grounded in both historic and contemporary perspectives on...

  • Security issues in telemedicine. Erbetta, John // Journal of Telemedicine & Telecare;Mar1999 Supplement 1, Vol. 5, p123 

    The article addresses the security issues surrounding telemedicine. The growing applications of telemedicine gives rise to issues of scale and security. Although encryption is often considered as the best solution to the problem of providing secure transmission, there are other vital...

  • Automatic Tracking of Bandpass Sampling OFDM Signals in Mobile Environment for Enhanced Security Communication. Xin Wang; Heung-Gyoon Ryu // International Journal of Security & Its Applications;Jul2013, Vol. 7 Issue 4, p135 

    Countless security and defense systems require an accurate Angle of Arrival (AOA) detection for incoming signals. Angle of Arrival (AOA) estimation is basic procedure required by several monitoring and tracking systems for security applications and other defense purposes. In this paper, a...

  • Living with the bugs. Levy, Steven // Newsweek (Pacific Edition);08/24/98 (Pacific Edition), Vol. 132 Issue 8, p2 

    Comments on Internet security, e-mail protection, and file security. The form of computer attack known as overflow buffer; The difficulty of keeping information safe when computers are getting more connected; Concern that flaws in network security will lead to disaster; How software companies,...

  • Living with the bugs. Levy, Steven // Newsweek (Atlantic Edition);08/24/98 (Atlantic Edition), Vol. 132 Issue 8, p2 

    Comments on Internet security, e-mail protection, and file security. The form of computer attack known as overflow buffer; The difficulty of keeping information safe when computers are getting more connected; Concern that flaws in network security will lead to disaster; How software companies,...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics