TITLE

Finding Hackers Before a Strike

AUTHOR(S)
Bruno, Mark
PUB. DATE
March 2003
SOURCE
Bank Technology News;Mar2003, Vol. 16 Issue 3, p39
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports the launching of intrusion prevention system in the U.S. Detection of computer crimes; Observation of abnormal activities in the network; Protection of the computer network.
ACCESSION #
9270709

 

Related Articles

  • Prevent, Detect and Respond: Intrusion Detection Systems. Pabrai, Uday O. Ali // Certification Magazine;Mar2003, Vol. 5 Issue 3, p27 

    Focuses on the features and functions of intrusion detection systems (IDS) designed to prevent attacks on an enterprise infrastructure. Types of attacks commonly reported by an IDS; Ways in which the attacks can be launched; Kinds of information that the attacks can provide to the attacker.

  • COMPUTER CRIME. Mano, D. Keith // National Review;7/27/1984, Vol. 36 Issue 14, p51 

    Focuses on the prevalence of computer crimes in the United States. Estimated amount lost annually through electronic rustling; Capabilities of computer hackers; Lack of federal computer-crime code; Penalties under wire-fraud legislation; Definition of computer crime in several states.

  • Secure Enough? Vergetis Lundin, Barbara L. // Buildings;Feb2001, Vol. 95 Issue 2, p34 

    Provides information on the impact of computer crimes on facilities management. Methods used for the implementation of computer security; Use of encryption to protect computer data; Benefits of deploying intrusion detection system. INSETS: In-House vs. Contracted Security;Data Security...

  • Bugged by Spyware?  // Software World;Jan2004, Vol. 35 Issue 1, p18 

    Reports on issues concerning security systems in the computer industry. Information about spyware, term given to software that gets installed without the users permission; Impact of the spyware program on the computer industry; Tips for dealing with spyware problems.

  • The Cyber Gold Rush. Dunkel, Dan // SDM: Security Distributing & Marketing;Aug2012, Vol. 42 Issue 8, p44 

    The article discusses the suthor's views on strategic security and cyber solutions for mobile devices. He explains the growing scale and scope of threats from cyber crime and espionage at vulnerable mobile devices. The author stresses the importance of education and protection using cyber...

  • Contactless Card Conundrum. Davidson, Ann // Credit Union Magazine;Mar2006, Vol. 72 Issue 3, p96 

    The article examines the advantages and disadvantages of contractless plastic electronic cards in terms of security. This particular card uses a wireless technology which is convenient to users in transactions such as authorization, processing and paying bills. However, concerns of the card...

  • Home Office unable to find £1.3m to fund e-crime team. Grant, Ian // Computer Weekly;3/25/2008, p5 

    The article reports that Great Britain Home Office minister Vernon Coaker has told the Association of Chief Police Officers (Acpo) in Great Britain that the government did not have the cash to start the national e-crime unit. Acpo has been asking the government for £ 1.3 million as seed...

  • Check your electronics savvy. Nelson, Ronald E. // SDM: Security Distributing & Marketing;Sep97, Vol. 27 Issue 10, p15 

    Presents a quiz on electronic security systems. Principles and components employed in electronic security systems; Connection of electronic keypad to control an electric lock; Type of memory that contains permanently written information.

  • Connect audio speakers in parallel, not series. Colombo, Al // SDM: Security Distributing & Marketing;Sep97, Vol. 27 Issue 10, p19 

    Answers reader-sent questions related to electronic security systems. Connection of audio speakers in parallel rather than series; Software for calculating the resistance and voltage drops in a notification appliance circuit; Separation of feed and return circuits.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics