TITLE

Risk Lurks in Spreadsheets

AUTHOR(S)
Baxter, Ralph
PUB. DATE
November 2010
SOURCE
Bank Technology News;Nov2010, Vol. 23 Issue 11, p38
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
In this article the author reflects on the data-integrity risk in user-developed applications (UDAs). It notes that Institute of Internal Auditors (IIA) had recently recommended on evaluating the security of UDAs arguing that it can be dangerous to any bank if not managed properly. It implies that one thing how banks can protect the integrity of their data is to identify their key UDAs. It adds that bank should track what goes on within UDAs and continually monitor usage.
ACCESSION #
55413851

 

Related Articles

  • In a Cyber Breach, Who Pays, Banks or Retailers? Tracy, Ryan // Banking Strategies Daily;1/14/2014, p3 

    The article focuses on Target Corp.'s recent customer data breach which include many banks and retailers. It is mentioned that some banks have argued that retailers should pay to reissue affected credit or debit cards although Target is already offering free credit monitoring and identity theft...

  • Data hosting infrastructure for primary biodiversity data. Goddard, Anthony; Wilson, Nathan; Cryer, Phil; Yamashita, Grant // BMC Bioinformatics;2011 Supplement 15, Vol. 12 Issue Suppl 15, p1 

    Background: Today, an unprecedented volume of primary biodiversity data are being generated worldwide, yet significant amounts of these data have been and will continue to be lost after the conclusion of the projects tasked with collecting them. To get the most value out of these data it is...

  • Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie–Hellman Assumption. Gan, Yuanju; Wang, Lihua; Wang, Licheng; Pan, Ping; Yang, Yixian // Computer Journal;Oct2013, Vol. 56 Issue 10, p1249 

    In threshold public-key encryption (TPKE), the decryption key is divided into n shares, each one of which is given to a different decryption user in order to avoid single points of failure. A robust TPKE is that if threshold decryption of a valid ciphertext fails, the combiner can identify the...

  • Another Suit Over TJX Breach.  // American Banker;3/27/2008, Vol. 173 Issue 59, p6 

    The author reports on a lawsuit which has been brought against TJX Cos. Inc. by AmeriFirst Bank Inc. regarding a computer breach which occurred in 2006. According to the article, the lawsuit claims that the bank faced expenses relating to fraud losses, reissuance costs and monitoring expenses....

  • More than 40% of companies have inadequate real-time breach detection capabilities.  // Software World;Jul2013, Vol. 44 Issue 4, p23 

    The article discusses the importance for business companies to have alternative solution or measure to mitigate the risks and liabilities from data break-ins. It notes the result of the survey conducted by the data protection specialist Varonis, which reveals that 40 percent of companies have no...

  • With Melissa Data's Data Quality Suite, University of Washington is Able to Ask "Why?".  // Database Trends & Applications;Apr/May2014, Vol. 28 Issue 2, p7 

    The article offers information regarding the move of the University of Washington (UW), a multi-campus university, to use Melissa Data Corp.'s Data Quality Suite. The university is also using Melissa Data's advanced record matching and data deduplication solutions as well as geocoding service to...

  • Key-Evolving Hierarchical ID-Based Signcryption. Zhang, Yinghui; Chen, Xiaofeng; Li, Hui // Computer Journal;Oct2013, Vol. 56 Issue 10, p1228 

    Key-evolving cryptography is intended to mitigate the damage in case of a secret key compromise, one of the severest security threats to actual cryptographic schemes. In the public-key setting, the essential idea of key-evolving lies in updating the private key with time, while maintaining the...

  • A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem. Zoe L. Jiang; Junbin Fang; Yiu, S. M.; Chow, K. P.; Lucas C. K. Hui; Long Chen; Xiamu Niu; Xuan Wang // International Journal of Digital Content Technology & its Applic;Jul2012, Vol. 6 Issue 13, p285 

    In digital forensics, data stored in a hard disk usually contains valuable evidence. Preserving the integrity of the data in the hard disk is a critical issue. A single hash value for the whole hard disk is not appropriate as the investigation may take a long time and latent sector errors (LSEs)...

  • DATA LOSS AND PROBABILITY OF THREATS ASSOCIATED WITH K-ANONYMITY. Sadad, Tariq; Rauf, Azhar; Hussain, Ayyaz // Interdisciplinary Journal of Contemporary Research in Business;Jun2011, Vol. 3 Issue 2, p302 

    K-anonymity provides a model to protect the confidentiality of the individual. It presents the data in such a way that for each single tuple there are k same types of tuples in the released table. In this paper, we calculate the total data loss in a table after applying k-anonymity. A measure is...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics