TITLE

Cybersecurity challenges pros to keep ahead of sinister minds

PUB. DATE
July 2014
SOURCE
Diversity/Careers in Engineering & Information Technology;Jun/Jul2014, Vol. 23 Issue 4, p42
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the challenges posed by cybersecurity to information technology (IT) experts, along with their insights on cybercrime and its impact on IT in the U.S.. The people who offered their views include doctor Douglas Maughan, George Smirnoff, and Kevin Greene. Topics include the study "Estimating the Cost of Cybercrime and Cyber Espionage," the stolen 110 million credit card numbers, and the need for people to be aware of IT and security.
ACCESSION #
99811304

 

Related Articles

  • Cheat Sheet: What Bankers Need to Know About the $1B Carbanak Heist. Crosman, Penny // Americanbanker.com;2/17/2015, p1 

    Kaspersky Lab has unveiled a cyber-heist in which hackers have already stolen $1 billion from banks across the world. Here's what banks should know about how the hackers did it -- and what institutions can do to protect themselves.

  • THE NEXT COLD WAR. Lawton, Stephen // SC Magazine: For IT Security Professionals (15476693);Apr2012, Vol. 23 Issue 4, p30 

    The article reports on cyber espionage wherein adversaries hire code-writers to create attacks that can run autonomously for years. Countries cited as leaders in state-sponsored cyber attacks against the U.S. include China and Russia. Other nations cited are North Korea, Iran, France and Israel....

  • U.S.-China Cyber-security Agreement Lacks Teeth, Has Holes. Lemos, Robert // eWeek;9/30/2015, p1 

    The article discusses shortcomings of the cyber security agreement and economic espionage between China and the U.S. Topics discussed include failure of agreement in the context of economy and national espionage, the views of Xi Jinping, president of China, on the promotion of domestic...

  • CYBER WARFARE. Kasuri, Zubair // Flare (Pakistan);7/15/2013, p26 

    The article examines whether Pakistan is capable of preventing cyber warfare. It states that the country is a fast growing market in information technology and that there is an increase in cyber crimes, however no one can ensure cybersecurity as cyber criminals also evolve and can even hack...

  • Hunting cybersecurity talent. Keating, Michael // American City & County Exclusive Insight;4/20/2015, p4 

    The article presents some of the cyber threats and data areas that has to be addressed as priorities under the heading of "Security." Topics discussed include security including risk assessment, governance and budget and resource requirements in determining what constitutes in "due care" in...

  • Overview and Analysis on Cyber Terrorism. Saint-Claire, Steve // School of Doctoral Studies European Union Journal;2011, Issue 3, p85 

    There are many forms of terrorism on the Internet. Some are not dangerous enough to be deemed a simple spread of information instead of terrorism. They are simple show of skill and are harmless. Acts of cyber-crimes may involve stealing of money, company secrets, or attacking country's...

  • 5 Lessons Learned. Olejnik, Jeff // Independent Banker;May2014, Vol. 64 Issue 5, p70 

    The article discusses the lessons learned on electronic credit card fraud in the U.S. It states that cybercrime is a sophisticated, organized operation and has a real financial impact. It reveals that easy-to-fix vulnerabilities can lead to big problems problem. Community banks and their...

  • Cyber Defense. Higgs, Michael // Retail Merchandiser;Sep/Oct2013, Vol. 53 Issue 5, p12 

    The article discusses the illegal operation of credit card numbers and personally identifiable information (PII) by the Russian criminal syndicates in the U.S. retail sector as of September 1, 2013. Topics include a report by the security research firm Ponemon Institute LLC showing a company's...

  • Ramping Up the Cyber Criminal Hunt. SEFFERS, GEORGE I. // Signal;Mar2014, Vol. 68 Issue 7, p29 

    The article focuses on two new cybercrime task forces being developed by the U.S. Secret Service that will enhance the agency's ability to detect and investigate information technology-related crimes. These include the task forces in Cincinnati, Ohio and Denver, Colorado. Electronic crimes refer...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics