TITLE

Talking Points

AUTHOR(S)
Sausner, Rebecca
PUB. DATE
June 2006
SOURCE
Bank Technology News;Jun2006 Supplement, Vol. 19, p10
SOURCE TYPE
Trade Publication
DOC. TYPE
Interview
ABSTRACT
The article presents an interview with Robert Statica, director of the Computer Forensic & Cybersecurity Laboratory at the New Jersey Institute of Technology. Statica relates that more and more cybercrime activity is moving toward organized and coordinated attacks, especially against critical computer infrastructure. He further adds that the hostile-government-sponsored attacks can have a devastating impact on the U.S. economy and national security.
ACCESSION #
21470440

 

Related Articles

  • Cyberwarfare.  // Background Information Summaries;5/ 3/2012, p2 

    Cyberwarfare comprises a relatively new national security threat occasioned by the rapid spread of computer technology in both military operations and the civilian economy. U.S. government reports have suggested that China in particular appears to be actively developing capabilities to disrupt...

  • Experts Offer Mix Of Views On Cyber Security Gains. Biesecker, Calvin // Defense Daily;6/15/2011, Vol. 250 Issue 54, p3 

    The article presents the views of several cyber security experts on cyber security gains in the U.S. According to experts' views, there have been gains in the ways the country counters cyber threats but those threats have grown and become more sophisticated. Mike Brown, director for...

  • Modelling Attribution. Guitton, Clement // Proceedings of the European Conference on Information Warfare & ;2013, p91 

    This article posits that attribution is better approached as a process than as a problem. Departing from models for attribution emphasising its technical constraints, the article distinguishes between two distinct attribution processes operating in two different contexts and answering two...

  • Zombie Nets. Munro, Neil // National Journal;7/14/2007, Vol. 39 Issue 28, p46 

    The article focuses on the challenge facing U.S. officials in dealing with national security cyber attacks. U.S. government officials are pushing foreign-policy and technology initiatives to combat organized, profitable, and increasingly politicized computer hackers, many of whom operate from...

  • The Year. Lindenmayer, Isabelle // American Banker;12/30/2005, Vol. 170 Issue 249, p5 

    The article reports that some computer experts are calling 2005 the worst year ever for security breaches. At least 130 reported breaches have exposed more than 55 million Americans to potential identity theft. However, the Department of Homeland Security's budget for cybersecurity programs was...

  • Cyber Warfare and Its Implications for National Security. Rao, Prasad // USI Journal;Oct-Dec2009, Vol. 139 Issue 578, p459 

    The article discusses the highlights of the 13th Colonel Pyara Lal Memorial Lecture on cyber warfare and its implications for national security, delivered by Shri KVSS Prasad Rao, chairman of the National Technical Research Organization in India, on October 21, 2009. Rao tackles the threats from...

  • Trusted Computing Fortifies Cyber-Defenses. Rashid, Fahmida Y. // eWeek;10/3/2011, Vol. 28 Issue 16, p23 

    Information about several topics discussed at the U.S. National Security Agency's (NSA) Trusted Computing Conference & Exposition in Orlando, Florida in September 2011 is presented. Topics include the role of trusted computing technologies on cyber-defenses and cyber threats, mobile security,...

  • Effects of Cybercrime on State Security: Types, Impact and Mitigations with the Fiber Optic Deployment in Kenya. Magutu, Peterson Obara; Ondimu, Gladys Monchari; Ipu, Christopher Jilo // Journal of Information Assurance & Cybersecurity;2011, Vol. 2011, p1 

    The identification of Information and Communication Technology (ICT) as an essential tool for sustainable development has proved to be worth every investment. As a result of this, Internet usage in Kenya has grown rapidly resulting in the explosion of Internet Service Providers (ISPs) and...

  • MasterCard takes swipe at online fraud. Fisher, Dennis // eWeek;6/28/2004, Vol. 21 Issue 26, p31 

    The article discusses computer crimes and their endangerment of the U.S. national security. As part of a continuing effort to halt the exploding online crime of phishing, MasterCard International Inc. is establishing a program to help eliminate the Web-based cardswapping rings and phony Web...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics