Who's bugging you? How are you protecting your information?

被引:1
作者
Yapp, Peter [1 ,2 ]
机构
[1] Network International
[2] Network International, IT Security Risk Management, Computer Evidence and Technical Investigation Unit
来源
Information Security Technical Report | 2000年 / 5卷 / 02期
关键词
Competitive intelligence - Computer applications - Computer software - Marketing - Modems;
D O I
10.1016/S1363-4127(00)02004-5
中图分类号
学科分类号
摘要
The incidences of fraud, misuse, and abuse of data have been rising with an increasing percentage of the workforce having access to corporate data. These incidences has led to the information protection, which has become a fundamental requirement for any business that wishes to survive and prosper in today's increasingly competitive markets. Information the needs protecting may include client lists, product/pricing details, payroll details, strategic information, marketing, plans, and pre-published results. The countermeasures for computer-related information protection include carrying out pre-employment screening on new staff, monitoring employees morale, not allowing use of dial-up modems, and installing access control software on all PCs.
引用
收藏
页码:23 / 33
相关论文
empty
未找到相关数据