Back to Basics On IT Security

Rothke, Ben
February 2011
Bank Technology News;Feb2011, Vol. 24 Issue 2, p31
Trade Publication
In this article the author discusses the security fundamentals of information technology (IT). He states that the laser toner cartridges are kept in locked rooms since a universal serial bus (USB) thumb drive amounting to 10 dollars could download confidential data and corporate proprietary. He relates that a chief financial officer (CFO) in banks managed the financial risk. He mentions that the security technologies including encryption, intrusion detection, and firewalls are needed in 2011.


Related Articles

  • USB Keyboard.  // Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p96 

    The article evaluates the USB keyboard for security video applications.

  • Byte size.  // APC (Bauer Media Group);Sep2010, Vol. 30 Issue 9, p8 

    The article offers news briefs related to information technology including a free utility test for testing the universal serial bus (USB) drives, decision taken by Oracle's OpenOffice team to break apart from Oracle and create its own evolution of OpenOffice called Libre Office and deal signed...

  • Briefs.  // SC Magazine: For IT Security Professionals (15476693);Aug2010, Vol. 21 Issue 8, p14 

    This section offers news briefs on information technology security including the partnership between flash media security provider BlockMaster and Kingston Digital, a manufacturer of universal serial bus (USB) drives, the selection of Rick Van Luvender as chairman of The Payments Processor...

  • Do the Right Thing.  // Retail Merchandiser;Sep/Oct2010, Vol. 50 Issue 5, p72 

    The article highlights the environmental measures being implemented by Staples Canada, based in Richmond Hill, Ontario. It has launched a cartridge-recycling program which was able to recycle more than 2 million catridges during the Earth Day and e-waste recycling. Staples Canada offers...

  • The Dangers of Unsecured USB Drives. Hyman, Paul // CIO Insight; 

    The article examines the computer security threats related with companies' failure to secure USB drives. It cites the study conducted at RSA Conference 2013 wherein most information technology professionals have admitted to inserting flash drives that they found lying around. It adds that most...

  • Free for all. Mantshantsha, Sikonathi // Finweek;9/23/2010, p39 

    The article discusses the ambiguities of transactions which relates to the protection and security of corporate information. It states that Companies and Intellectual Property Registration Information Office (Cipro) has cleared itself of the loopholes on questionable transactions pertaining to...

  • Data-leak prevention: Pros and cons. Garretson, Cara // Network World;1/7/2008, Vol. 25 Issue 1, p39 

    An interview with Nick Selby, head of enterprise security research at the 451 Group is presented. When asked about the advantages of anti-data-leakage products, he replies that the products are good at providing visibility into what's going out of the building to enterprises. However, he said...

  • Business Ontology Building in Cloud Manufacturing. Zhong Xie // Applied Mechanics & Materials;2014, Issue 644-650, p4914 

    Among the existing research findings, when the combination structure of manufacturing cloud service combination (MCSC) is formed, the actual situation of the service capability in cloud pool has not been objectively taken into account. It would result in service match failure. Aiming at a...

  • Products.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2008, p46 

    The article evaluates the Yogi Pico Pro universal serial bus (USB) security device from Yoggie.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics