TITLE

Data in Danger

AUTHOR(S)
Ewing, Lance
PUB. DATE
November 2011
SOURCE
Best's Review;Nov2011, Vol. 112 Issue 7, p67
SOURCE TYPE
Trade Publication
DOC. TYPE
Opinion
ABSTRACT
In this article the author discusses the aspects of data security in the insurance industry. He states that alongwith computer hacking, data in portable devices including smartphones and electronic tablets, are vulnerable to hackers. He explains all portable devices synched to personal computers are liable for phishing. He offers several suggestions on data security, including store only relevant data, use whole disk encryption programs, and update data security programs regularly.
ACCESSION #
67005073

 

Related Articles

  • FIVE THINGS YOU NEED TO KNOW ABOUT... Keeping Your Online Accounts Safe. Wu, Angela // Money;2012, p33 

    The article presents information about keeping one's online accounts safe. Topics discussed include developing a strong password that is unlikely to be guessed by computer software and unrelated to personal information like a pet's name, how to identify phishing scams that seek passwords, and...

  • Analysis and Implementation of Transposition Techniques. Bansal, Satish; Srivastava, Rajesh // IUP Journal of Computer Sciences;Apr2012, Vol. 6 Issue 2, p45 

    This paper presents some of the transposition and symmetric-based techniques, where the key is not used separately because it is hidden in the message. Early classical ciphers-substitution and transposition operations-have formed the building blocks for today's powerful ciphers such as the Data...

  • An Improved Cryptographic Technique to Encrypt Images using Extended Hill Cipher. Rajput, Yashpalsingh; Gulve, A. K. // International Journal of Computer Applications;Dec2013, Vol. 83, p4 

    This work proposes an improved scheme to encrypt the digital image for its security. The proposed system is divided into 3 main phases. In first phase, the single digit number into which the given digital image can be divided is calculated. In the second phase, bit rotation, reversal &...

  • Untitled. Ashford, Warwick // Computer Weekly;6/22/2010, p26 

    The article reports on the adoption of full disc encryption and media encryption systems by the Great Britain's government funded agency Business Link Northwest. It is reported that, Business Link has taken the step to bring its security in line with the policies of the government's Northwest...

  • How the HD-DVD/Blu-ray hack was done. Kidman, Angus // APC (Bauer Media Group);Apr2007, Vol. 27 Issue 4, p8 

    The article focuses on the damages made by muslix64, an online hacker, on high-definition (HD) DVDs. It was initiated through the release of a BackupHDDVD in December 2006 that was capable of removing the Advanced Access Content System decryption in HD-DVD titles. It adds that an updated version...

  • Payment Card Data - Know Your Defense Options. Mattsson, Ulf // Database & Network Journal;Aug2008, Vol. 38 Issue 4, p3 

    The article provides information on how to protect credit card data, while minimizing the cost and effort of Payment Card Industry Data Security Standard (PCI DSS) compliance in Great Britain. The author stated that organizations must develop applications that prevent all forms of attack and...

  • Implementation of highly efficient Authentication and Transaction Security. Verma, Garima // International Journal of Computer Applications;May2011, Vol. 21, p43 

    Kerberos is a network authentication protocol & is designed to provide strong authentication for client/server applications by using secret-key cryptography. Our research was aimed at enhancing the security of transactions over a network. In this paper, we used Kerberos Encryption Technique for...

  • TWO PHASE CLANDESTAIN IMAGE ENCRYPTION. Hemanth, V.; Kumar, R. Praveen // Advanced Computing;Jan2013, Vol. 4 Issue 1, p35 

    In today's internet world is full of data steals and hackers. So, there is a essential to design a system that assists the internet users to interchange their secret and private data safely across the web. Information-hiding process in a Steganography system starts by identifying medium's...

  • ENSURING Client Information REMAIN SAFE.  // Westchester County Business Journal;Autumn2011 PBNY Connect, p16 

    The article offers information on security protocols to secure business' information and prevent security breaches. It mentions that maintaining security involves regular screening for the system's new threats, device encryption, and testing to check if the system can be easily hacked. It states...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics