Sunday, September 30, 2012

Cybersecurity Inadequate to Combat Attacks on U.S. Banks

An overseas organization may be behind the recent spate of bank websites being overloaded with heavy traffic disrupting online access to accounts ("Cyber Attacks on U.S. Banks Expose Computer Vulnerabilities," Bloomberg Businessweek, September 28, 2012). To stem the tide of these distributed denial-of-service attacks (DDoS) on financial institutions, the White House may issue an executive order to set up new security systems to prevent downtime of "vital computer networks" since cybersecurity legislation is stalled in Congress. This latest round of cyber assaults on banks created inconvenience for customers, but not theft of secure data.

Review selected library titles related to cybersecurity and computer crimes at LSC-CyFair Branch Library. Click the title of a listed item, select the "Request" button in the listing, and enter your library card number and PIN for each title you want to reserve for pick up at the library.

Use these subject words and phrases to find more in the library catalog:
  • business data security
  • computer crimes
  • computer hackers
  • computer networks security
  • computer security
  • data protection
  • information technology security
  • Internet security
Computer Security Fundamentals book coverComputer Security Fundamentals by Chuck Easstom - Pearson, 2012.
call number: 005.8 Eas
"Beginning with a general introduction to computer security, the volume covers topics such as Internet fraud and abuse, denial of service attacks, malware, hacking techniques, industrial espionage, encryption, developing security policies, network penetration testing, and basic computer forensics techniques. . .Easttom is a certified IT professional and the author of several books on computer and networking topics." - publishers summary \excerpt

America the Vulnerable book coverAmerica the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare by Joel Brenner - Penguin, 2011.
call number: 364.168 Bre
"Brenner, a former inspector general for the National Security Agency, raises the alarm about inadequately addressed threats and vulnerabilities to computer and communications systems. This problem has been addressed by administrations unsuccessfully since the 1980s and Brenner believes more needs to be done soon. This alarming account by an expert is worthy of serious attention from policy makers and average readers alike." - Publishers Weekly review excerpt

Cybersecurity: Public Sector Threats and Responses
by Kim J. Andreasson- CRC, 2012. call number: EBSCO eBook Collection Database (see title link to access book)
"Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve." - publishers summary excerpt

No comments: