Of Trojan Horses, Data Diddling, and Logic Bombs
Article Abstract:
Computer related crimes are increasing constantly, many of which are competitors for the biggest heist ever. But even more than these large dazzling crimes, small companies are often in real peril from a lack of computer security. And with more and more computers being used daily, controls over normal office functions often dissipate, and managers have less control than before over office information and who has access to what. A group of teenagers dubbed 'The Assassins,' terrified the Atlanta business community by cleverly stealing hardware and disks from over thirty companies. Outright theft can be less damaging than data manipulation, especially by someone within the company. Insiders can often do the most damage, but here the small company has an advantage - key employees are well known to the owner, who can notice any changes in moods. But a good offense - that is, well planned computer security - can be the best defense against computer crime.
Publication Name: Inc.
Subject: Business, general
ISSN: 0162-8968
Year: 1984
User Contributions:
Comment about this article or add new information about this topic:
Protecting Your Personal Data
Article Abstract:
Under the United Kingdom Data Protection Act of 1984, all persons involved with the processing of personal data for computer services, with the exception of holders of payroll data, must register with the Data Protection Registrar. They must also comply with Data Protection Principles, briefly summarized in the text. In addition, any individual is entitled to knowledge of and access to data held about that individual and to have appropriate corrections made. A booklet, 'Data Protection' produced by accountants Ernst and Whinney, is recommended. The address from which copies can be obtained is provided.
Publication Name: The Director
Subject: Business, general
ISSN: 0012-3242
Year: 1984
User Contributions:
Comment about this article or add new information about this topic:
Which Data Base System Is Best?
Article Abstract:
Two popular data systems for small businesses are dBase II and Lotus 1-2-3. DBase II is able to manipulate information, cross reference the files and program as well. DBase II costs $700 dollars and requires at least 96K of memory. Lotus 1-2-3 combines graphics and spreadsheet analysis as well as information management. Lotus 1-2-3 costs $495 dollars and needs at least 128K of memory. DBase II is a complete data base management system while Lotus 1-2-3 is an analytical system. The training needed on both systems is from sixty to 120 hours. A cartoon of diskettes is included.
Publication Name: Venture
Subject: Business, general
ISSN: 0191-3530
Year: 1984
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Private Hospitals and the Pursuit of Excellence. Hedging Your Health Bets. The Functional Flair of Private Aircraft
- Abstracts: Performance-related pay and the prospects for gender pay equity. Worthy adversaries
- Abstracts: Option trading and the relation between price and earnings: a cross-sectional study
- Abstracts: Test of the rationale for conglomerate merger: agency costs or pecking order? Management of scientific institutions NPL 1995-98: The transition from agency to government-owned contractor operated
- Abstracts: The fast track; for many researchers, the Internet is too crowded and to slow. One answer: vBNS. CAMPAIGN SUBSIDIES ARE NOT THE ANSWER