TITLE

Identity

PUB. DATE
June 2009
SOURCE
Forbes Asia;6/22/2009, Vol. 5 Issue 11, p6
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports a study which investigates the identity of various aspects of cyber crime. It determines how cyberthieves steal data and identity and how to safely lock personal information. It tracks profit-motivated cybercrime and its movement from the U.S. and western Europe to eastern Europe as well as in Asia. The study reveals that the cyberspace in China is embodied by vigilantes.
ACCESSION #
43100087

 

Related Articles

  • Risk.  // Network Dictionary;2007, p415 

    A definition of the term "Risk" is presented. In information security, Risk refers to the likelihood of a successful attack. Risk is measured as the product of the level of threat with the level of vulnerability.

  • 7 security disasters.  // Consumer Reports;Jul2014, Vol. 79 Issue 7, p19 

    The article provides information on seven electronic security breaches, explaining how they occurred, the extent of the problems they created, and updates on responses to the events and the current conditions as of July 2014. Topics include the hacking of retailer Target's customer credit card...

  • Open Sesame.  // America;8/18/2008, Vol. 199 Issue 4, p4 

    The article defines the significant change of the word open sesame from children classic books to the latest technological innovation. In the 21st century, the term is used by technocriminals on the Internet, where identity thieves play a high-stakes game for real, stealing passwords to enter a...

  • Laptop Theft Highlights Need To Think About Mobile IT Security.  // Database & Network Journal;Dec2006, Vol. 36 Issue 6, p22 

    The article highlights the importance of Mobile IT security in response to the theft of a laptop containing Nationwide Building Society customer information. It is said that millions of confidential information details are able to be held on a single laptop and majority of companies admit to...

  • Salvation Army draws battle lines against the fraudsters and hackers. Jennings, Cath // Computer Weekly;4/22/2008, p20 

    The article reports that the charity Salvation Army UK is in the process of setting up a charities security forum with Cancer Research UK in an attempt to raise end-user awareness and tackle rising concerns such as phishing. Martyn Croft, head of corporate systems at the Salvation Army UK, says,...

  • The rise of cyber-crime families. Prince, Brian // eWeek;7/21/2008, Vol. 25 Issue 22, p16 

    The article offers information on the Cyber-crime organizations in the U.S. These group collaborate around a classic Mafia-style model. Research shows that the organization's computer threats have grown more sophisticated wherein individual hackers are replaced with a well-structured...

  • Web 2.0 woes.  // NetworkWorld Asia;Aug/Sep2009, Vol. 5 Issue 4, p20 

    The article focuses on the research published by the information technology and data protection firm Sophos Inc. concerning the cybercrime 2009 in Asia. The research shows that cybercriminals exploit social networks and use them to identify potential victims. The research also mentions that...

  • Ponemon Says Breaches Growing Costlier.  // American Banker;2/12/2009, Vol. 174 Issue 29, p16 

    This article presents information from a report about data breaches from Ponemon Institute LLC. The report states that the cost of data breaches has risen by 11 percent since 2006 and the average cost per breach has risen by 40.4 percent. Most of the breaches were caused by the negligence of...

  • Can't we just ignore PCI DSS? Kedgley, Mark // SC Magazine: For IT Security Professionals (15476693);May2012, p17 

    The article discusses the adoption of the Payment Card Industry Data Security Standard (PCI DSS) as a sensible thing to do from a security perspective and whose benefits eventually outweigh the pitfalls. It refers to PCI as a comprehensive framework and it cites arguments that its requirements...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics