Mouse & Cat Games

Wickham, Rhonda
April 2007
Wireless Week;4/15/2007, Vol. 13 Issue 8, p4
Trade Publication
The author discusses issues on data protection. She states that cybercrime will remain in the electronic world for as long as technology is changing. Cybercriminals shift into using wireless fidelity networks and voice over Internet protocol, causing maximum disruption. She comments that although there are counsel and tools available, operators should still limit data applications and build up their firewalls for safety.


Related Articles

  • What's Next. Freedman, David H. // Inc.;Aug2005, Vol. 27 Issue 8, p57 

    Focuses on the implication of the problems concerning computer security for business enterprises. Background on computers systems hacked in 1992; Failure of firewall, intrusion detection systems and antivirus software to protect computer data from hackers; Susceptibility of the Internet to...

  • Blocking the Path. Friedman, Norman // U.S. Naval Institute Proceedings;Jan2011, Vol. 137 Issue 1, p88 

    The article focuses on the manipulation of the Internet traffic by China with reference to two incidents. In one, a mass of Internet traffic with U.S. military addresses, was routed through China. In another, Internet users from the U.S. and Chile could not contact some Web sites that the...

  • Security tool fights zero-day threats. Sartain, Julie // Network World;12/10/2007, Vol. 24 Issue 48, p38 

    The article discusses the significance of network behavior analysis (NBA) to companies in the U.S. It is a tool that fill the void left by static security products including firewall, which enforced preexisting policies and intrusion-detection/prevention systems (IDS/IPS), detecting and blocking...

  • Viruses 'winning the war' Fisher, Dennis // eWeek;3/8/2004, Vol. 21 Issue 10, p9 

    This article presents an analysis on the threat of computer viruses. The threats which are variants of previous malware, such as Bagle, Netsky or MyDoom, did not spread widely or do much damage. IT managers say that with several threats showing up daily, few enterprises can keep up. Focus on...

  • Increased mobile working means viruses may bypass normal security systems, unless IT managers tighten perimeter controls by introducing a system of quarantine. Butler, Paul // Computer Weekly;8/30/2005, p30 

    The article focuses on issues related to computer security. With threats to the corporate network on the increase, security is one of the biggest service disrupters facing systems administrators and network managers. Information technology (IT) managers frequently experience concerns regarding...

  • Data Security approach for Right to Information of Developer. Aggarwal, Vivek; Bhatia, Abhimanyu // International Journal of Advanced Research in Computer Science;May/Jun2013, Vol. 4 Issue 3, p292 

    Nowadays Data Security is a major field in IT sector. Data Security doesn't just mean password protection, data hiding, encryption or adding additional firewalls -- it also means having complete information about your data i.e. where your data is kept and who all view it. This paper consists of...

  • Viruses tag along.  // eWeek;3/29/2004, Vol. 21 Issue 13, p25 

    If there's one thing that anti-virus software makers fear, its the creation of a virus delivery mechanism that evades detection by their signature-based products. The development of detection files for every new virus is the meat and potatoes of what anti-virus vendors do. Because each virus is...

  • Managing Vulnerability To Network Attacks. Kleinfeld, Abe // Government Security;Aug2004, Vol. 3 Issue 5, p16 

    The article presents information about the information security. Despite legislation and heightened awareness of the negative impact of network breaches, many government organizations still lag behind in efforts to protect their networks-and comply with regulations. Typical reactive technologies...

  • When Fear Is Justified. Fox, Steve // InfoWorld;2/9/2004, Vol. 26 Issue 6, p6 

    Discusses computer security issues concerning Web-based applications, with reference to the article "Are Your Web Apps Secure?," by Curtis Franklin and Jordan Wiens, published in the February 9, 2004 issue of "InfoWorld." Potential problems associated with attacks on such applications;...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics