TITLE

Convergence As a Cyberwar Weapon

AUTHOR(S)
Powers, Edward W.
PUB. DATE
August 2010
SOURCE
Bank Technology News;Aug2010, Vol. 23 Issue 8, p30
SOURCE TYPE
Trade Publication
DOC. TYPE
Opinion
ABSTRACT
In this article the author discusses the aspects of robbery through cyber hacking. It believes that financial institutions' lobby guards, alarm systems and computer passwords and personal identification numbers (PIN) are only the thinnest layer of defense against technologically capable thieves. He stresses that financial institutions and business enterprises should consider restructuring the way they protect themselves, their electronic systems and their clients.
ACCESSION #
53576598

 

Related Articles

  • Going on the offensive. Kevany, Kevin // NZ Business;Dec2010, Vol. 24 Issue 11, p42 

    The article focuses on the innovations in security implemented by several companies in New Zealand. Nearly 3 billion U.S. dollars worth of goods were lost by New Zealand and Australian stores due to customer or employee theft in the year leading to June 30, 2010, according to the Global Retail...

  • It's in the Finger. Ting, David // Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p46 

    The article focuses on the combination of biometrics and Enterprise Single Sign-On solutions in protecting physical and information technology-based resources from identity theft in the U.S. Most corporations implement strong multi-factor authentication policies to comply to strict mandates from...

  • Surveillance evolves. LAWLESS, PHILLIP // Professional Carwashing & Detailing;Mar2012, Vol. 36 Issue 3, p40 

    The article offers information on the usage of advanced surveillance system in the carwash industry. It states that carwash owners rely on it as it provides evidence of theft, damage or vandalism. It also focuses on the new surveillance technology called video analytics. It presents a difference...

  • Give thieves a hard time. Imbert, Peter // Management Today;May98, p99 

    Suggests how business enterprises can secure their technological and expensive items of labour-saving equipment from thieves. Action that can be taken to deter thieves; Importance of security marking on your equipment.

  • Beware of online identity theft.  // Flare (Pakistan);12/15/2011, p29 

    The article offers tips to ensure privacy of personal information and avoid online identity theft. It mentions that privacy settings must always be enabled whenever filling out online forms. It also cites other concerns which include updating browser and operating system, avoiding fake e-mails,...

  • Video surveillance technology now more affordable and versatile. Zarcone, Teresa // Caribbean Business;1/25/2001, Vol. 29 Issue 3, p32 

    Focuses on the benefits of video surveillance technology for businesses in Puerto Rico. Affordability for small and medium-sized businesses; More effective monitoring of a building; Growing demand for surveillance cameras.

  • Is the security industry providing service quality? Webster, Chris // NZ Business;Oct96, Vol. 10 Issue 9, p48 

    Discusses the importance of security systems in business enterprises. Measurement of the overall effectiveness of business security; Need to consider security upgrade; Causes of security problems.

  • To be or not to be: The lowdown on ID badges. O'Connell, Tim // Security: Solutions for Enterprise Security Leaders;Mar1998, Vol. 35 Issue 3, p59 

    Probes the reasons behind some company's non-mandating of the wearing of identification badge. Ensuring of employee well-being through display of badges; Influence of computer culture; Cost considerations; Linking of badging policies to degree of accessibility of a facility. INSET: New bumps...

  • ON THE WEB.  // Security: Solutions for Enterprise Security Leaders;May2011, Vol. 48 Issue 5, p57 

    The article offers information on topics related to security technologies located at securitymagazine.com, which include the relationship with security integrator, funding of security proposals and security system integrator.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics