Creating a Cyberdefense

Stuart, Anne; Mochari, Ilan
January 2002
Inc.;Jan2002, Vol. 24 Issue 1, p90
Offers tips on protecting a company's computer systems. Priority of small businesses; Importance of having a firewall or shield between the company's internal systems and the Internet; Overview of making backup for all systems.


Related Articles

  • KEEPING AHEAD OF HACKERS. Franklin, Diane // Credit Union Management;Aug2001, Vol. 24 Issue 8, p31 

    Deals with computer security management. Details on the security tools of Digital Defense Inc.; Importance of regular vulnerability assessments; How to eliminate vulnerabilities of the system.

  • Protecting EDP systems from fifth-column attacks. Hawkins, David H. // Management Review;Oct72, Vol. 61 Issue 10, p51 

    Presents an article condensed from the June 1972 issue of the journal 'Computer Decisions,' about computer security for companies. Inclusion of the need for data processing managers to ensure that access to the computer system is controlled; Incorporation of security profiles with various...

  • SECURITY RED ALERT. Kosan, Lisa // eWeek;11/13/2000, Vol. 17 Issue 46, p139 

    Explores approaches which can be employed by business organizations to respond to computer network security alerts. Assessment of response to security breaches; Systematic way of dealing with the growing number of security alerts; Factors to consider when determining the appropriate response to...

  • WHAT'S MORE IMPORTANT THAN SECURITY. Gibson, Stan // eWeek;11/13/2000, Vol. 17 Issue 46, p146 

    Explores ways of preventing breaches in the computer networks of businesses. Extent of damages caused by security breaches in companies; Microsoft Corp.'s experience with computer hackers; Ways of responding to security breaches.

  • MANAGERS CAN BE FREAKIER THAN HACKERS. Taschek, John // eWeek;11/13/2000, Vol. 17 Issue 46, p164 

    Reports on the security issues affecting corporate networks discussed at the Vulnerability Summit hosted by 'EWeek' magazine and Guardnet. Security threat from corporate management; Role of information technology managers with regard to security issues; Consequences of having unsecured networks.

  • Securing the enterprise network. McQuilken, Barry, // Telecom Asia;Jun97, Vol. 8 Issue 6, p74 

    Talks about the emergence of technologies and standards that will support a range of secure services for the corporate intranet and extranet. Support for secure socket layer (SSL); One-time password versus SSL; Secure wide area network; Enterprise security services; Security check.

  • SECURE YOUR BUSINESS. Gibbons, Patrice // BRW;01/19/2001, Vol. 23 Issue 2, p22 

    Focuses on the prevention of breaches to corporate computer security in Australia. Solutions to internal security breaches; Development of security policies incorporating multi-layer security levels; Ways of gathering information on security breaches.

  • Cyber Paradox. Warner, Judy // NACD Directorship;Sep/Oct2014, Vol. 40 Issue 5, p6 

    An introduction is presented where the editor-in-chief discusses the cover story on oversights in cyber-risk management and mentions an interview with the former governor of Pennsylvania Tom Ridge on cyber risks in companies.

  • Role-Based Access Secures E-Business. Murrell, Laurie // National Underwriter / Property & Casualty Risk & Benefits Manag;8/13/2001, Vol. 105 Issue 33, p15 

    Reports on the significance of a computer security platform based on role-based access control (RBAC) to maintain customer privacy and data security. Details of the functionality of RBAC; Description on the use of RBAC; Benefits of the system to insurance companies.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics