TITLE

Keeping It Confidential

AUTHOR(S)
Slavin, Al
PUB. DATE
July 2010
SOURCE
Best's Review;Jul2010, Vol. 111 Issue 3, p37
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the effect of identity theft on insurance companies in the U.S., as well as information about data breaches that triggers cyber liability coverage law. It presents figures on the number of identity theft incidents happened from 1986-2009. It mentions that the loss of data due to breach in security means losing financial opportunities.
ACCESSION #
53157549

 

Related Articles

  • Towards Security Risk-oriented Mal Activity Diagram. Chowdhury, Mohammad Jabed Morshed // International Journal of Computer Applications;10/15/2012, Vol. 56, p47 

    Recently security has became one of the major concern in Information System (IS) development. Different security modeling language or security extension is used to model security features of IS. Mal Activity Diagram (MAD) is used at the design stage to represent security aspect. But it cannot...

  • Outsourcing Information Security: Contracting Issues and Security Implications. Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan // Management Science;Mar2014, Vol. 60 Issue 3, p638 

    A unique challenge in information security outsourcing is that neither the outsourcing firm nor the managed security service provider (MSSP) perfectly observes the outcome, the occurrence of a security breach, of prevention effort. Detection of security breaches often requires specialized...

  • EDUCATING THE WORLD IN CYBERSECURITY.  // SC Magazine: For IT Security Professionals (15476693);Dec2015/Jan2016 Supplement, p73 

    The article offers information on SANS, a one-stop education provider of information security, which includes hands-on training, security awareness programs, and global information assurance certification (GIAC). It discusses the family of products of SANS including a cyber guardian, SANS...

  • Don't Be a Friend to the Fraudster. Belak, Phyllis A.; Oehlers, Peter F. // Pennsylvania CPA Journal;Spring2009, Vol. 80 Issue 1, p1 

    The article discusses the need to protect personal information and data against threats of fraud in the U.S. It states that public record information in many government agencies could easily be gained and this could be a target for identity theft. It notes that companies are also at a greater...

  • "Overcoming Trust Barriers: Evaluating Inter-Organisational Knowledge Sharing in UK Online Retail Sector". Chohan, Rozina; Shah, Mahmood; Larson, Mitchell; Welch, Mary // Proceedings of the European Conference on Knowledge Management;2014, Vol. 3, p1156 

    The changes in society such as the shift of business from onsite to online where the customer is not present in person have made identity crimes easier and more attractive in terms of financial rewards. The use of digital equipment and the Internet has facilitated not only business and consumers...

  • Joint Commission urges these preventive actions.  // ED Management;Feb2009 Supplement, p2 

    The article presents actions suggested by the Joint Commission to prevent patient harm connected with the implementation and use of health information technology (IT) as well as converging technologies. These include scrutiny of workflow processes and procedures for risks and inefficiencies and...

  • When You Can't Say No. Ogren, Eric // Information Security;Jan2007, Vol. 10 Issue 1, p12 

    This article discusses the demands of some companies for the post-admission control capabilities in Cisco Systems' Network Admission Control and Microsoft's Network Access Protection. They include enforcing identity-based networking, preventing the rampant outbreak of an infection, reducing...

  • NEW TRENDS IN IT&C SECURITY EVALUATION. Păun, Cristian Teodor; Simion, Emil // Lex ET Scientia International Journal;2010, Vol. 17 Issue 2, p281 

    This paper focuses on the link between information security and cryptography represented by National Institute of Standards and Technology (NIST) cryptographic standards, Federal Information Processing Standard FIPS 140-2 (Security requirements for cryptographic modules) standard and Common...

  • An Integrated Electricity Information Security Monitoring Platform. Ran Yu; Jiaojiao Zhang; Hongfei Xu; Shen Jin // Applied Mechanics & Materials;2014, Vol. 701/702, p947 

    An integrated electricity information security monitoring platform is presented, electrical information security integrated real-time monitoring of the state power applied information security systems, security equipment, network equipment, network boundaries, desktop computers, to improve...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics