TITLE

House Panel Pledges Online-Security Review

AUTHOR(S)
Eggerton, John
PUB. DATE
June 2011
SOURCE
Multichannel News;6/6/2011, Vol. 32 Issue 23, p10
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports that Republican leadership of the House Energy & Commerce Committee are pledging for a comprehensive review of issues related to online data security and privacy staring on June 2, 2011.
ACCESSION #
61105687

 

Related Articles

  • Key Trends that'll Impact Online Security in 2016. Singh, Atul // PC Quest;Dec2015, p55 

    The article focuses on the key trends that affect online security in 2016. Topics discussed include several types of cyber attacks, which include identity thefts, data breaches, and malware, securing the growing transactions in India, such as debit and credit cards and mobile wallets, and...

  • Welcome To McDonalds, May I Take Your Data. Loguercio, Michael // Insurance Advocate;3/17/2014, Vol. 125 Issue 5, p20 

    The article discusses the risks of cyber crimes that target the data of companies and personally identifiable information of its customers in context to the cyber-data breach that targeted fast food chain McDonald's in 2010 and also offers steps that can help in stopping cyber attacks. The...

  • CHAPTER 8: Data Security and the Internet. Cross, Richard F. // Bank Security Desk Reference;2013, Vol. 1, p1 

    Chapter 8 of the book "Bank Security Desk Reference" discusses data security issues involving online financial transactions. Some of the computer crimes investigated by the U.S. Federal Bureau of Investigation's (FBI) National Computer Crime Squad include major computer network intrusions,...

  • Information Highway Robbery. DOUGLAS, SUSAN J. // In These Times;Jun2014, Vol. 38 Issue 6, p15 

    The article focuses on the surveillance of online activities and the concerns related to the same. Topics discussed include the book "Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance" by Julia Angwin, Pulitzers prize to the newspapers "Washington...

  • AES proved vulnerable.  // Network World;8/22/2011, Vol. 28 Issue 15, p8 

    The article reports on the vulnerability of the Advanced Encryption Standard (AES), the algorithm used to secure online transactions.

  • Trusted Identities to Secure Critical Infrastructure. Daniel, Michael // Whitehouse Blog;2013, p776 

    A blog post is presented about the National Strategy for Trusted Identities in Cyberspace (NSTIC), an initiative of the administration of U.S. President Barack Obama aimed at improving the privacy, security and convenience of sensitive online transactions.

  • TOUCHSCAPE PROVIDES DATABASE CLEANSING/SECURITY.  // Worldwide Databases;Mar2001, Vol. 13 Issue 3, p3 

    Focuses on TouchScape Corp.'s strategic partnerships with FirstLogic and PrivacyRight to provide enhanced data cleansing, security and information management to their customers. Services offered by FirstLogic; Availability of PrivacyRight to TouchScape-empowered Web sites that require...

  • ISSUES INFLUENCING THE USE OF E-SIGNATURES FOR SECURE E-BUSINESS TRANSACTIONS IN PAKISTAN. Kundi, Ghulam Muhammad; Qureshi, Qamar Afaq; Miankhel, Amanullah Khan; Khan, Shadiullah // Gomal University Journal of Research;Dec2012, Vol. 28 Issue 2, p92 

    This paper focuses on the issues of eSignatures for secure eTransactions in Pakistan i.e. social and legal issues. Internet has become affordable in developing countries like Pakistan, yet the societal changes surrounding eSignatures are even greater threat than that of developed countries. The...

  • A game of chance. Mackenzie, Dana // New Scientist;6/7/2003, Vol. 178 Issue 2398, p36 

    It was designed to protect online transactions, government communications and other sensitive information from prying eyes, but the world's new gold standard for encryption is already under threat. At the end of February, 2003 the European Union's flagship cryptography committee, New European...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics