Convergence As a Cyberwar Weapon

Powers, Edward W.
August 2010
Bank Technology News;Aug2010, Vol. 23 Issue 8, p30
Trade Publication
In this article the author discusses the aspects of robbery through cyber hacking. It believes that financial institutions' lobby guards, alarm systems and computer passwords and personal identification numbers (PIN) are only the thinnest layer of defense against technologically capable thieves. He stresses that financial institutions and business enterprises should consider restructuring the way they protect themselves, their electronic systems and their clients.


Related Articles

  • Today's Energy Theft Detection Models Help Protect Revenues While Enhancing Neighborhood Safety. Madrazo, Michael // Pipeline & Gas Journal;Jul2010, Vol. 237 Issue 7, p16 

    The article discusses the peer comparison and characteristic analysis as categories of theft detection models. Peer comparison models contrast all available information about commercial and residential customers to the same businesses and homes within the same geographical settings....

  • STEALING SHEEP IN THE NIGHT: FINANCIAL INSTITUTION SECURITY IN THE DIGITAL AGE. Bauerle, James F. // Banking Law Journal;May2001, Vol. 118 Issue 5, p467 

    Discusses financial institution security in the digital age. Hypothetical case of computer fraud at a fictional financial institution; Need for Internet financial services security; List of security measures in the Guidelines Establishing Standards for Safeguarding Customer Information; Steps...

  • Disk Encryption a Priority for Businesses. Eddy, Nathan // Channel Insider;6/23/2011, p1 

    The article reports on the study which shows that two-thirds of respondents who attended the Infosecurity Europe 2011 said that disk encryption is an Information Technology (IT) security priority in businesses. According to Jim Fulton of DigitalPersona, they have witnessed a steady stream of...

  • 15 Emerging Trends in the Security Sector for 2016. Preimesberger, Chris // eWeek;12/29/2015, p1 

    The article offers information on several emerging security trends suggested by security professionals for industries and business enterprises for 2016. Topics discussed include conducting of security operations by organizations to reduce the risk of hacking activities, misrepresentation of data...

  • Establishment of Improved Business Security Systems. Wookjae Cha; Dongho Won // World Academy of Science, Engineering & Technology;Feb2011, Issue 50, p1 

    No abstract available.

  • LOCKING DOWN YOUR NETWORK.  // Motor Age;Aug2008, Vol. 127 Issue 8, p40 

    The article offers tips to protect one's business from hackers taking advantage of one's wireless network and reaching company information, from the Specialty Equipment Market Association (SEMA). It is suggested to turn on wireless encryption on one's laptops and configure them to connect to...

  • Almost 70 percent of businesses have been hacked in the last year, and one-third have no cyber coverage. Donlon, Rosalie L. // Claims;Jul2015, Vol. 63 Issue 7, p8 

    The article focuses on a study conducted by The Hartford Steam Boiler Inspection and Insurance Company (HSB) which reveals that 70 percent of businesses were hacked at least once in 2014. It mentions that businesses of all sizes need to anticipate hacking trends and deploy resources for data...

  • Beware of online identity theft.  // Flare (Pakistan);12/15/2011, p29 

    The article offers tips to ensure privacy of personal information and avoid online identity theft. It mentions that privacy settings must always be enabled whenever filling out online forms. It also cites other concerns which include updating browser and operating system, avoiding fake e-mails,...

  • Security- The Human Factor.  // Software World;Jan2009, Vol. 40 Issue 1, p18 

    The article offers information on the term Trojan, one of the most feared types of computer malware. Other computer security threats include hacking, electronic fraud, electronic burglary, and the physical loss or theft of computer hardware. According to Information Security Breaches Survey, the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics