TITLE

Banks' Arsenal Grows Larger

AUTHOR(S)
Grebb, Michael
PUB. DATE
June 2003
SOURCE
Bank Technology News;Jun2003, Vol. 16 Issue 6, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on cyber security programs of banks in the United States. Union Bank's installation of a software from enterprise security firm, ArcSight to detect and catalog attempted hacks; U.S. regulators' threat to penalize banks that fail to secure their networks; Coordination between banks' compliance departments and information technology and security units.
ACCESSION #
9981793

 

Related Articles

  • Combating data breaches and safeguarding card payments.  // North Western Financial Review;Aug2014, Vol. 199 Issue 9, p28 

    The article discusses the importance for bank companies to implement measures that will help them combat data breaches and safeguard card payments in the U.S. It the outlines the significant impact of data breaches, point-of-sale attacks, and malware on the security of payment card data and...

  • The Slippery Slope of Enterprise Security. Bielatan, Jennifer // Information Executive;Mar/Apr2002, Vol. 6 Issue 2, p6 

    Focuses on the solutions to the limitation of security programs to protect business data from hackers. Creation of obstacles protecting corporate-critical information from intrusion; Concept of the software Security Wellness Continuum from RedSiren Technologies Inc.; Institution of the firewall...

  • Hunting down the hackers. Bird, Jane // Management Today;Jul94, p64 

    Provides information on how computer crime is solved in the United Kingdom. Steven Bellovin as a computer hacker; Facts from a DTI; Reason for the growth in computer crime; Diversion of funds as the often goal of organized hackers; Number of viruses in circulation according to IBM; Passwords as...

  • Diminishing Cyber Risk. Denes, Shary // Rural Telecommunications;Jul/Aug2002, Vol. 21 Issue 4, p9 

    Discusses the steps that should be taken by companies to protect themselves for cyber attacks. Recognition of security vigilance; Way to protect the confidentiality, integrity and availability of network-based assets.

  • Access denied. Sheehy, Don; Trites, Gerald // CA Magazine;Sep95, Vol. 128 Issue 7, p50 

    Discusses computer security. Results of the survey of Ernst & Young on losses arising from breach of information security; Protection of local area networks; Data privacy through Data Encryption Standard (DES); Rivest, Shamir and Alderman algorithm (RSA); Development of passwords.

  • Tracking an attack often provides little benefit; top deterrent is secure systems everywhere. McClure, Stuart; Scambray, Joel // InfoWorld;06/26/2000, Vol. 22 Issue 26, p94 

    Comments on the importance of a secure computer system in deterring a hacker attack. Disadvantages of tracking down port scans; Strategy used by hackers in attacking a computer system; Attacking Windows NT software.

  • FBI Center to Fight Net Fraud.  // Air Conditioning Heating & Refrigeration News;05/15/2000, Vol. 210 Issue 3, p61 

    Reports on the United States government's launched of the Internet Fraud Complaint Center to combat the increasing fraud on the Internet. Handling of the complaint center operation by the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center; Web site; Total...

  • Here come the cyber-crime busters. Dempsey, Shelley // BRW;02/16/2001, Vol. 23 Issue 6, p84 

    Reports on efforts of several companies to prevent cyber crimes. Cases being investigated by electronic-crime consultancies; Percentage of computer security problems caused by a company staff; PricewaterhouseCoopers' cyber-crime investigations team in its disputes analysis and investigation...

  • How to protect your business online.  // BRW;3/11/2010, Vol. 32 Issue 9, p31 

    The article offers suggestions on how to protect businesses from cyber crimes which include using firewall, updated security patches, and protection against viruses.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics