TITLE

stopping data hackers

AUTHOR(S)
Morgan, Bryan
PUB. DATE
June 2002
SOURCE
Wireless Week;6/3/2002, Vol. 8 Issue 22, p32
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses the challenges faced by wireless application developers in providing wireless data security. Problems caused by mobile service theft and computer viruses created by computer hackers; Approaches that can be used to deal with the problems; Factors to consider in providing security measures to protect corporate intranets.
ACCESSION #
6791889

 

Related Articles

  • You Breach, You Pay? Ritchey, Diane // Security: Solutions for Enterprise Security Leaders;Aug2011, Vol. 48 Issue 8, p12 

    The article reports on several legislation introduced in the U.S. to prevent cybercrime and data breaches including Personal Data Privacy and Security Act which requires American businesses that collect and store consumers' sensitive personal information to safeguard information from cyber threats.

  • Security: Everyone Has A Stake. Dziatkiewicz, Mark // Wireless Week;09/18/2000, Vol. 6 Issue 38, p22 

    Discusses issues on the adoption of security measures in the wireless communication industry. Response of several carriers on the issue; Information on global industry initiatives for secure mobile transactions.

  • New Security Solution To Replace WEP.  // Wireless Week;11/4/2002, Vol. 8 Issue 40, p12 

    Reports on the support of companies for the Wi-Fi Protected Access of Wi-Fi Alliance to replace the Wired Equivalent Privacy. Design of the solution; Target application of the Wi-Fi Protected Access.

  • Secure network services thwart cyber criminals. Griffin, Beth // Credit Union Magazine;Sep2001, Vol. 67 Issue 9, p57 

    Focuses on the implementation of a computer network security program to prevent computer hacking in credit unions. Threat posed by hackers to credit unions; How to design effective solutions; Information on the secure network services provided by CUNA Network Services to help credit unions...

  • Fraud Control Techniques Advance With The Crimes. Albright, Peggy // Wireless Week;11/01/99, Vol. 5 Issue 44, p41 

    Presents information on several technologies that prevent fraud in the wireless communications industry. Details on SuperSleuth from Nortel; Features of Alias, a fraud profiler developed to complement the Lightbridge FraudBuster program from Lightbridge Inc.; PhonePrint system from Corsair...

  • Building A Secure Wireless World. Smith, Brad // Wireless Week;01/24/2000, Vol. 6 Issue 4, p19 

    Deals with security in wireless e-commerce. Internet security companies entering the wireless business; Details on the announcements made by wireless security companies.

  • Dear Santa: Send Security. Tran, Dzung // Wireless Week;12/17/2001, Vol. 7 Issue 50, p3 

    Commends the move of corporate decision-makers in the cellular telephone services industry are starting to consider the problem of security in wireless communications networks. Discussion on privacy issue in wireless communication; Strategy which companies can employ to protect themselves...

  • NBA Reveals The Bigger Picture. McLaughlin, Kevin // CRN;6/25/2007, Issue 1243, p30 

    The article reports that many security solution provides are turning to network behavior analysis (NBA) technology to protect the switching layer that links desktops to the Internet and to each other. NBA technology is able to account for the dynamic changes occurring on networks and...

  • Spam Hunter. Barret, Victoria Murphy // Forbes Asia;9/17/2007, Vol. 3 Issue 15, p130 

    The article profiles Patrick Peterson, technology head at IronPort, which makes hardware and software that can block spam and virus-carrying e-mail before it hits corporate networks. On a typical day IronPort's hardware, deployed at companies around the world, catches 5 billion spam e-mails, or...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics