TITLE

News & Analysis

PUB. DATE
October 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2010, Vol. 47 Issue 10, p14
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers news briefs related to security management. Hayes International Corp.'s retail theft survey revealed that dishonest employee apprehensions and apprehension recoveries have decreased in 2009 from 2008. An iPhone software called multimedia situation awareness upgrades several Apple features including compass, accelerometer, and wireless fidelity (Wi-Fi). A Gartner Research report revealed the potential use of global positioning system (GPS) in smartphones for authentication.
ACCESSION #
54462589

 

Related Articles

  • Tamper Resistance: Security Considerations for GNSS Receivers. Pozzobon, Oscar; Wullems, Chris; Detratti, Marco // GPS World;Apr2011, Vol. 22 Issue 4, p37 

    The article focuses on security considerations related to GNSS (global positioning system) receivers. Three uses of cryptographic keys and functions, are listed, including signal access control, and navigation data authentication and access control. Other issues discussed include navigation data...

  • A bird's eye view. Saccomano, Anna // Journal of Commerce (1542-3867);7/28/2003, Vol. 4 Issue 30, p28 

    Focuses on a cargo-security project that will test a track-and-trace system using Global Positioning System (GPS) technology for trucks moving across the border between the U.S. and Canada. Goal of the project; Background on the group that initiated the project; Benefits of GPS technology in...

  • Biometric Authentication and Authorization System for Grid Security. Kathrine, G. Jaspher Willsie; Kirubakaran, E. // International Journal of Hybrid Information Technology;2011, Vol. 4 Issue 4, p43 

    Dynamicity in the data sharing has resulted in resource usage being more and more distributed and more open in nature. The need for problem solving and the distributed nature of data has resulted in the development of grid environment. Authentication is the first step of security requirement for...

  • On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order. Girault, Marc; Poupard, Guillaume; Stern, Jacques // Journal of Cryptology;Autumn2006, Vol. 19 Issue 4, p463 

    In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature scheme that combine provable security based on the problem of computing discrete logarithms in any group, short keys, very...

  • GPS spoofing threat. Humphreys, Todd E.; Psiaki, Mark L.; Kintner, Jr., Paul M. // Wireless Asia;Jan/Feb2009, Vol. 12 Issue 1, p18 

    The article discusses the techniques on how to detect and address global positioning system (GPS) spoofing in Asia. Accordingly, GPS is also vulnerable to information attacks and ineffective cryptographic authentication measures which could increase maintenance costs. The attack includes...

  • On automotive event data recorders, or "black boxes". Freeman, Dave // Portable Design;Apr2006, Vol. 12 Issue 4, p6 

    The article reports on the use of automotive event data recorders (EDRs) and its possible implication to invasion of privacy. EDRs record data which may consist of the speed of car, the use of seatbelts and break pedals. This has been used in investigating accidents in recent years that resulted...

  • The Two-Factor Factor. Moltzen, Edward F. // CRN;10/15/2007 Supplement, p18 

    The article discusses systems biometrics. It focuses on the fingerprint-based biometric security in mainstream technology which is a type of two-factor authentication. Lenovo introduced the biometrics to ThinkPads which was thought to be unobtainable in the past years. A bright future is...

  • The Privacy Officer's Priorities.  // Information Management (1521-2912);Sep/Oct2011, Vol. 21 Issue 5, p9 

    The article discusses the results of the study "Top Five Issues and Research Agenda, 2011 to 2012," by Gartner, Inc., which observes the overlap of privacy, security and compliance risks.

  • Global Security Spending to Reach $60 Billion in 2012.  // Security: Solutions for Enterprise Security Leaders;Nov2012, Vol. 49 Issue 11, p12 

    The article reports that the global security expenditure is likely to reach $60 billion in 2012 and $86 billion by 2016, according to a Gartner Inc. research.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics