TITLE

SOMEONE IS WATCHING

AUTHOR(S)
Rountree, David
PUB. DATE
September 2001
SOURCE
Bank Technology News;Sep2001, Vol. 14 Issue 9
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Profiles Dorsey Morrow, a lawyer who obtained the highest network security certification from the International Systems Security Certification Consortium. Employment as network security watchdog on Brinks Internet Security; Obsession with computers during high school days; Manner of dealing with computer hackers.
ACCESSION #
5196579

 

Related Articles

  • Network security: Mission impossible? Radcliff, Deborah // Software Magazine;Jan97, Vol. 17 Issue 1, p60 

    No abstract available.

  • Safeguarding your network. Davis, Joyce E.; Muhammad, Tariq K. // Black Enterprise;Oct96, Vol. 27 Issue 3, p48 

    Offers advice for companies on how to prevent computer network break-ins. Examination of audit trail kept by most operating systems; use of third-party software solutions; Ways on how to avoid importation of viruses.

  • Network watchdogs. T.K.M. // Black Enterprise;Oct96, Vol. 27 Issue 3, p50 

    Presents tools and resources to help business enterprises make their computer networks tamper-resistant. Security Analysis Tool for Auditing Networks; Computer Security Institute; Books on computer networks security.

  • Today's installations require whole-building power and data protection. Keil, Ken // Cabling Installation & Maintenance;Jul96, Vol. 4 Issue 8, p61 

    Discusses the use of the whole-building approach in efforts to protect local area networks, computer systems, high-speed modems and digital telephones from power quality problems. Appropriate protective strategy and actions for particular power and data quality problems; Spot protection and...

  • Safeguarding the keys to the enterprise. McQuilken, Barry // Telecom Asia;Sep96, Vol. 7 Issue 9, p58 

    Focuses on the adoption of token-based authentication technology by companies to protect computer networks. Features; Authenticating external and internal access; Equipment and supplies; Third party support issues.

  • Hire-a-hacker. Mamis, Robert A. // Inc.;Aug93, Vol. 15 Issue 8, p39 

    Announces Price Waterhouse Data Security Penetration Studies, New York City, now has available for hire a team of hackers who will launch unannounced raids on a company's access-control systems to evaluate their vulnerability. How the service works; Cost; Contact point for more information.

  • Editors Message. Das, Vinu V. // International Journal of Network Security (2152-5064);Oct2011, Vol. 2 Issue 4, following p36 

    An introduction is presented in which the editor discusses the need of research in the area of Privacy Preserving Protocols.

  • Businesses still leery of Internet security. Rodda, Kelli // Business Press;07/05/96, Vol. 9 Issue 10, p3 

    Reports on United States corporations' lack of adequate security systems to manage computer network access. Internal occurrence of security problems; Strategies to address information security.

  • Who's who in cyberspace: Issuing online passports. Pescatore, John // America's Network;4/15/96, Vol. 100 Issue 8, p10 

    Focuses on verifying the identity of someone on computer networks. Electronic mail addresses; Certificate authorities; Passport applications; Need for directories.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics