Weapons to Fight the Next War. (cover story)

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Additional Information
    • Subject Terms:
    • Abstract:
      The article focuses on the steps that U.S. business enterprises should take to ensure data protection from computer hackers. Rootkits, Trojan virus and bots can be prevented by creating a strong authentication. The U.S. Homeland Security Directive 12 requires a governmentwide identification verification system for both physical and logical access. Data encryption is necessary in order to protect data in case of laptop theft. Computer security researchers are trying to develop unique signatures to make anti-virus programs spot each product protected.