𝔖 Bobbio Scriptorium
✦   LIBER   ✦

How to protect your data

✍ Scribed by Helen Meyer


Publisher
Elsevier Science
Year
1996
Tongue
English
Weight
254 KB
Volume
15
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

✦ Synopsis


word processor to hunt through them for particular names or keywords like 'password'or 'cash'. Once likely fraud or theft targets have been established, they can then fine-tune the original scanning program to record only messages sent to the pagers they identify Pager messages in Britain are sent out across the country, rather than to specific areas. This allows hackers in Aberdeen to scan for messages in London as if they were sitting in Hyde Park. Several hackers have logged pages from security firms giving their guards'alarm passwords and PIN numbers to let themselves into buildings. Others have tracked shop and pub managers paging daily cash totals into their head offices before making night bank deposits.


πŸ“œ SIMILAR VOLUMES


How to protect distributed data
✍ Helen Collinson πŸ“‚ Article πŸ“… 1995 πŸ› Elsevier Science 🌐 English βš– 132 KB
Identity and access: How to protect your
✍ Lily Bi πŸ“‚ Article πŸ“… 2008 πŸ› John Wiley and Sons 🌐 English βš– 93 KB

## Abstract How good is your Internet security? What procedures do you have to protect your most valuable electronic assets? As e‐business grows, so does the need for identity and access management (IAM). But what exactly is IAM, and how can it protect your business? __Β© 2008 Wiley Periodicals, Inc

Is your auditor protecting your confiden
✍ Abbie Gail Parham; Leslie B. Fletcher; A. Lee Gurley III πŸ“‚ Article πŸ“… 1998 πŸ› John Wiley and Sons 🌐 English βš– 342 KB

## Independent auditors are required to maintain the confidentiality of client-related information. But a published study suggests that accounting firms may not be providing adequate protection for confidential client electronic data on PCs or laptops. The authors detail some key steps CFOs should t