Feds plan for hack attacks

Messmer, Ellen
October 1997
Network World;10/20/97, Vol. 14 Issue 42, p43
Trade Publication
Reports on the submission of a report to US President Bill Clinton on how the United States government should prepare for computer crimes. Sharing of sensitive security information between users, vendors and the government; Control issues on the expansion of telecommunications and Internet infrastructure. INSET: Preparing for cyberspace attacks..


Related Articles

  • Computer fraud--what can be done about it? Romney, Marshall // CPA Journal;May95, Vol. 65 Issue 5, p30 

    Addresses the problem of computer-based fraud. Dependence on computerized systems to meet increasing need for information; Ways to perpetrate computer fraud; Computer fraud techniques; Reduction of computer crimes by increasing the integrity of employee; Design of internal control systems. ...

  • `Innocent' hackers want their computers back. Charles, D. // New Scientist;5/9/92, Vol. 134 Issue 1820, p9 

    Reports that United States officials refuse to return computers to owners which were seized during Operation Sun Devil raids on computer hackers. Description of the operation; The meager results of the operation; Computer Professionals for Social Responsibility have gone to court over this.

  • `An Embezzler's Guide to Your Computer' available.  // Westchester County Business Journal;10/28/96, Vol. 35 Issue 44, p19 

    Presents excerpts from `An Embezzler's Guide to Your Computer,' a report available from Assets Protection Publishing. Embezzlement as the second most common crime against business; Two common embezzlement methods.

  • Trouble for employers.  // Nation's Business;Feb85, Vol. 73 Issue 2, p57 

    Whether computer criminals are corporate managers transferring assets, or hackers stealing hundreds of thousands of dollars of computer time, computer crime can present a company with a problem of devastating proportions. A variety of insurance security plans are being launched to reduce the...

  • On site: The tamperproof office. LaPlante, A. // PC World;Jul91, Vol. 9 Issue 7, p240 

    Describes the steps Sun Life Assurance Company of Canada has taken to protect itself from computer security threats. Protecting information on PCs; Identifying PC security risks; Security classifications for PCs; Preventive measures; Education in security threats.

  • Antivirus and security products. Heim, J. // PC World;Jul91, Vol. 9 Issue 7, p247 

    Lists 26 antivirus products. Types of virus fighters; Integrity checkers; Memory-resident monitors; Security products; Choosing an anti-virus or security product.

  • Fending off the hackers. Elliott, Robert // Inside Tucson Business;07/15/96, Vol. 6 Issue 16, p3 

    Recommends basic strategies for preventing computer crime. Includes minimizing Internet connectivity; Building a computer arbiter; Constant data reduction.

  • Staying ahead of the hacker. McQuilken, Barry // Telecom Asia;Jul96, Vol. 7 Issue 7, p46 

    Presents a class of electronic products designed to protect against unauthorized access to computer systems, services and resources. Includes granting of privileges; User authentication; Encryption; Strengths and weaknesses of the Internet; Implementation of information security.

  • Keep eye shut for computer fraud by other employees. Culp, Mildred // San Diego Business Journal;06/29/98, Vol. 19 Issue 26, p45 

    Advises on protecting a company's computer system from fraud by other employees. Company's need to use services of accounting firms to help look for incidence of fraud; Need for the implementation of outside and internal controls; Monitoring of employees who use computers secretly or unusually;...

  • Antivirus hardware. Mamis, Robert A. // Inc.;Sep92, Vol. 14 Issue 9, p50 

    Considers a line of computer hardware that physically bars the spread of data-garbling germs: Corporate Management Group's (Austin, Tex.) assortment of low-priced mechanical contrivances that, among other measures, seal the slots of computers' floppy drives and CD-ROMs. Different devices;...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics