Computer security in financial organizations:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford
Elsevier Advanced Technology
1990
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | VIII, 118 S. |
ISBN: | 0946395640 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV008900915 | ||
003 | DE-604 | ||
007 | t| | ||
008 | 940223s1990 xx |||| 00||| eng d | ||
020 | |a 0946395640 |9 0-946395-64-0 | ||
035 | |a (OCoLC)22181273 | ||
035 | |a (DE-599)BVBBV008900915 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
050 | 0 | |a HF5548.2 | |
082 | 0 | |a 005.8 |2 20 | |
084 | |a QK 300 |0 (DE-625)141640: |2 rvk | ||
100 | 1 | |a Essinger, James |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer security in financial organizations |c James Essinger |
264 | 1 | |a Oxford |b Elsevier Advanced Technology |c 1990 | |
300 | |a VIII, 118 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Electronic data processing departments |x Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bank |0 (DE-588)4004436-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Bank |0 (DE-588)4004436-1 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Bank |0 (DE-588)4004436-1 |D s |
689 | 1 | 1 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=005888541&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-005888541 |
Datensatz im Suchindex
_version_ | 1825766750171430912 |
---|---|
adam_text |
CONTENTS
INTRODUCTION
1. THE COMPUTER SECURITY PROBLEM
Prioritizing Computer Security 1
Computer Security Technology 4
Developing a Strategic Approach to Computer Security 6
Principal Computer Security Hazards, and Responses 6
The Physical Access Hazard 8
The Electronic Access Hazard 11
A Note on Password Security 13
The Communications Hazard 14
The Systems Shutdown Hazard 21
Impact Analysis 23
Contingency Planning 24
Disaster Recovery Service Options 25
'Hof Disaster Recovery Service 26
The Electromagnetic Induction Hazard 27
Banking Control Mechanisms 28
Audit Trails 28
Computer Security — A Personal View 29
Security at SWIFT 34
2. THE COMPUTER CRIMINAL AT WORK
The Mind of the Computer Criminal 37
Examples of Compu ter Crimes 42
3. COMPUTER SECURITY AND THE LAW
Introduction 47
I Trouble Ahead' 50
II The Enforcers 57
The United States Secret Service 57
The City of London Police Fraud Department 58
The UK Serious Fraud Office 60
Kroll Associates 62
III Computer Crime Legisalation 64
United Kingdom 64
United States 70
4. EXPERTS' VIEWPOINTS
United Kingdom — The Users 74
United Kingdom — Suppliers 76
United States — The Users 90
United States — Suppliers 92
5. PREVENTING BREACHES IN COMPUTER SECURITY
Computer Security Guidelines for Financial Organizations 102
10 Guidelines for Maximizing Computer Security 103
BIBLIOGRAPHY 107
GLOSSARY 105
INDEX 107 |
any_adam_object | 1 |
author | Essinger, James |
author_facet | Essinger, James |
author_role | aut |
author_sort | Essinger, James |
author_variant | j e je |
building | Verbundindex |
bvnumber | BV008900915 |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.2 |
callnumber-search | HF5548.2 |
callnumber-sort | HF 45548.2 |
callnumber-subject | HF - Commerce |
classification_rvk | QK 300 |
ctrlnum | (OCoLC)22181273 (DE-599)BVBBV008900915 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV008900915</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">940223s1990 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0946395640</subfield><subfield code="9">0-946395-64-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)22181273</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV008900915</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HF5548.2</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QK 300</subfield><subfield code="0">(DE-625)141640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Essinger, James</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security in financial organizations</subfield><subfield code="c">James Essinger</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Elsevier Advanced Technology</subfield><subfield code="c">1990</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 118 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bank</subfield><subfield code="0">(DE-588)4004436-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Bank</subfield><subfield code="0">(DE-588)4004436-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Bank</subfield><subfield code="0">(DE-588)4004436-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=005888541&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-005888541</subfield></datafield></record></collection> |
id | DE-604.BV008900915 |
illustrated | Not Illustrated |
indexdate | 2025-03-05T15:00:56Z |
institution | BVB |
isbn | 0946395640 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-005888541 |
oclc_num | 22181273 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | VIII, 118 S. |
publishDate | 1990 |
publishDateSearch | 1990 |
publishDateSort | 1990 |
publisher | Elsevier Advanced Technology |
record_format | marc |
spelling | Essinger, James Verfasser aut Computer security in financial organizations James Essinger Oxford Elsevier Advanced Technology 1990 VIII, 118 S. txt rdacontent n rdamedia nc rdacarrier Electronic data processing departments Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Bank (DE-588)4004436-1 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Bank (DE-588)4004436-1 s Datensicherung (DE-588)4011144-1 s DE-604 Computerkriminalität (DE-588)4010452-7 s HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=005888541&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Essinger, James Computer security in financial organizations Electronic data processing departments Security measures Datensicherung (DE-588)4011144-1 gnd Bank (DE-588)4004436-1 gnd Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4004436-1 (DE-588)4010452-7 |
title | Computer security in financial organizations |
title_auth | Computer security in financial organizations |
title_exact_search | Computer security in financial organizations |
title_full | Computer security in financial organizations James Essinger |
title_fullStr | Computer security in financial organizations James Essinger |
title_full_unstemmed | Computer security in financial organizations James Essinger |
title_short | Computer security in financial organizations |
title_sort | computer security in financial organizations |
topic | Electronic data processing departments Security measures Datensicherung (DE-588)4011144-1 gnd Bank (DE-588)4004436-1 gnd Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | Electronic data processing departments Security measures Datensicherung Bank Computerkriminalität |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=005888541&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT essingerjames computersecurityinfinancialorganizations |