Banking on network security basics
- Publisher
- Elsevier Science
- Year
- 2000
- Tongue
- English
- Weight
- 151 KB
- Volume
- 2000
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
also discuss how to guarantee E-commerce security and how to combat Internet fraud and viruses with international laws.
Banking on network security basics
Following Barclays' recent security problems, a consumer group has stated that high street banks need to get back to IT basics in order to deliver secure online banking services. In the UK, the Consumer's Association has called for banks to pay more attention to basic software testing and observe data protection legislation, rather than set up new bodies to tackle Internet security.
According to Alan Stevens, head of digital services at the Consumer's Association, "There are some very good regulations and laws in place that apply to UK Internet banks. It is not a case of putting new regulations in place. Companies have to make sure that their own back-office systems are secure and that they use normal rules of IT development."
Barclays is still testing its upgraded online banking service and has not given a date for when it will be re-installed. The bank blamed the security glitch on a software code error in the upgraded site.
๐ SIMILAR VOLUMES
implement solutions can provide most of the security that is required. Observers point out that highly secure technology such as encryption adds undue complexity and cost beyond its benefit, unless the organization is a high-risk target. Instead, security managers should watch what they put on the n
September 7 996 Network Security autumn. CERT may continue to support businesses and other non-government organizations through a separate operation.
malformed IP packets that cause large amounts of data to be copied into memory, resulting in server or network device crashes. NetRanger sends an alert with details of the two attacks to a central management system. LANTimes, December 8, 1997, p. 18.
Based on the Pawlak rough set theory, this paper investigates separations in covering approximation spaces, give some characterizations of these separations and some relations among these separations. As an application of these results, investigations on network security are converted into investiga