Risk Lurks in Spreadsheets

Baxter, Ralph
November 2010
Bank Technology News;Nov2010, Vol. 23 Issue 11, p38
Trade Publication
In this article the author reflects on the data-integrity risk in user-developed applications (UDAs). It notes that Institute of Internal Auditors (IIA) had recently recommended on evaluating the security of UDAs arguing that it can be dangerous to any bank if not managed properly. It implies that one thing how banks can protect the integrity of their data is to identify their key UDAs. It adds that bank should track what goes on within UDAs and continually monitor usage.


Related Articles

  • In a Cyber Breach, Who Pays, Banks or Retailers? Tracy, Ryan // Banking Strategies Daily;1/14/2014, p3 

    The article focuses on Target Corp.'s recent customer data breach which include many banks and retailers. It is mentioned that some banks have argued that retailers should pay to reissue affected credit or debit cards although Target is already offering free credit monitoring and identity theft...

  • Data hosting infrastructure for primary biodiversity data. Goddard, Anthony; Wilson, Nathan; Cryer, Phil; Yamashita, Grant // BMC Bioinformatics;2011 Supplement 15, Vol. 12 Issue Suppl 15, p1 

    Background: Today, an unprecedented volume of primary biodiversity data are being generated worldwide, yet significant amounts of these data have been and will continue to be lost after the conclusion of the projects tasked with collecting them. To get the most value out of these data it is...

  • Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie–Hellman Assumption. Gan, Yuanju; Wang, Lihua; Wang, Licheng; Pan, Ping; Yang, Yixian // Computer Journal;Oct2013, Vol. 56 Issue 10, p1249 

    In threshold public-key encryption (TPKE), the decryption key is divided into n shares, each one of which is given to a different decryption user in order to avoid single points of failure. A robust TPKE is that if threshold decryption of a valid ciphertext fails, the combiner can identify the...

  • Another Suit Over TJX Breach.  // American Banker;3/27/2008, Vol. 173 Issue 59, p6 

    The author reports on a lawsuit which has been brought against TJX Cos. Inc. by AmeriFirst Bank Inc. regarding a computer breach which occurred in 2006. According to the article, the lawsuit claims that the bank faced expenses relating to fraud losses, reissuance costs and monitoring expenses....

  • DATA LOSS AND PROBABILITY OF THREATS ASSOCIATED WITH K-ANONYMITY. Sadad, Tariq; Rauf, Azhar; Hussain, Ayyaz // Interdisciplinary Journal of Contemporary Research in Business;Jun2011, Vol. 3 Issue 2, p302 

    K-anonymity provides a model to protect the confidentiality of the individual. It presents the data in such a way that for each single tuple there are k same types of tuples in the released table. In this paper, we calculate the total data loss in a table after applying k-anonymity. A measure is...

  • More than 40% of companies have inadequate real-time breach detection capabilities.  // Software World;Jul2013, Vol. 44 Issue 4, p23 

    The article discusses the importance for business companies to have alternative solution or measure to mitigate the risks and liabilities from data break-ins. It notes the result of the survey conducted by the data protection specialist Varonis, which reveals that 40 percent of companies have no...

  • With Melissa Data's Data Quality Suite, University of Washington is Able to Ask "Why?".  // Database Trends & Applications;Apr/May2014, Vol. 28 Issue 2, p7 

    The article offers information regarding the move of the University of Washington (UW), a multi-campus university, to use Melissa Data Corp.'s Data Quality Suite. The university is also using Melissa Data's advanced record matching and data deduplication solutions as well as geocoding service to...

  • THE SCENE OF THE CRIME. Beverly, Robert // Engineered Systems;Oct2012, Vol. 29 Issue 10, p8 

    The author reflects on the High-Performance Buildings (HPB) conference in the U.S. He cites the presentations given by Craig Walker of the United Technologies Research Center and Liam Buckley of EIS Consulting on how to manage and handle data bankruptcy. The author also mentions the factors that...

  • Data, define thyself. CASTAGNA, RICH // Storage Magazine;Sep2013, Vol. 12 Issue 7, p3 

    The article focuses on key data protection methods. It is noted that to give data a place to live and ensure it was protected by tucking away copies used to be the job of a storage manager. It is mentioned that a process that's external to the data is dealing with data using software or hardware...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics