How to protect your data
β Scribed by Helen Meyer
- Publisher
- Elsevier Science
- Year
- 1996
- Tongue
- English
- Weight
- 254 KB
- Volume
- 15
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
β¦ Synopsis
word processor to hunt through them for particular names or keywords like 'password'or 'cash'. Once likely fraud or theft targets have been established, they can then fine-tune the original scanning program to record only messages sent to the pagers they identify Pager messages in Britain are sent out across the country, rather than to specific areas. This allows hackers in Aberdeen to scan for messages in London as if they were sitting in Hyde Park. Several hackers have logged pages from security firms giving their guards'alarm passwords and PIN numbers to let themselves into buildings. Others have tracked shop and pub managers paging daily cash totals into their head offices before making night bank deposits.
π SIMILAR VOLUMES
## Abstract How good is your Internet security? What procedures do you have to protect your most valuable electronic assets? As eβbusiness grows, so does the need for identity and access management (IAM). But what exactly is IAM, and how can it protect your business? __Β© 2008 Wiley Periodicals, Inc
## Independent auditors are required to maintain the confidentiality of client-related information. But a published study suggests that accounting firms may not be providing adequate protection for confidential client electronic data on PCs or laptops. The authors detail some key steps CFOs should t