search query: @indexterm computer networks / total: 288
reference: 40 / 288
« previous | next »
Author:Behar, R.
Title:Who's reading your e-mail?
Journal:Fortune
1997 : FEB, VOL. 135:2, p. 28-36
Index terms:COMMUNICATION
COMPUTER SECURITY
COMPUTER NETWORKS
Language:eng
Abstract:As the world gets networked, rogue employees, spies and bored teens are invading companies' computers to make sabotage, steel trade secrets and make mischief. A U.S. survey made 1995 found that 24% of corporations had no procedures for safeguarding propriety data, and nearly half of companies didn't have a basic security policy for their computer systems. Most companies that have been electronically molested won't tell about it, because they don't want to loose public trust and image. Computer attacks are common and they can originate everywhere. Whatever hackers' motives are, in the frontier world of Internet, virtually every weapon needed is just a keystroke away.
SCIMA record nr: 159672
add to basket
« previous | next »
SCIMA