Computer Security in Financial Organisations by J. Essinger

By J. Essinger

This ebook presents a different in–depth specialise in how monetary agencies and providers of machine safeguard are at present addressing – in strategic phrases – the matter of computing device security.

Written in a simple to learn, non technical sort the ebook is key interpreting for all these fascinated about the administration of this delicate quarter, from machine defense managers, monetary administrators and bosses to analysts and architects in monetary software program houses.

The document analyses the pc defense standards of a large choice of corporations within the monetary companies zone, starting from retail, advertisement and funding banks to monetary buying and selling and funding administration organizations.

Show description

Read Online or Download Computer Security in Financial Organisations PDF

Best banks & banking books

Reforming the World Bank: Twenty Years of Trial - and Error

Within the many experiences of the realm financial institution a severe factor has been ignored. whereas writers have checked out the Bank's political economic system, lending, stipulations, recommendation, possession and accounting for matters reminiscent of the surroundings, this examine seems on the financial institution as a company - if it is manage to do the task it's alleged to do and, if no longer, what will be performed approximately it.

The Art of Better Retail Banking: Supportable Predictions on the Future of Retail Banking

"This new e-book on retail banking is either readable and cutting edge. Its research is strangely obtainable in its sort, and the book's conclusions and predictions may be rightly idea scary. the buyer is gaining genuine strength and this new book's insights at the value of management, the necessity to unharness creativity and to make a bank's IT and other people source interact extra successfully for client pride are very important tips that could the form of destiny aggressive differentiation.

Financial Crisis and Bank Management in Japan (1997 to 2016): Building a Stable Banking System

This ebook explores the demanding situations confronted via the japanese economic system and the japanese banking following the monetary obstacle that emerged round the flip of the final millennium. the writer explores how the japanese monetary obstacle of the overdue Nineteen Nineties engendered large restructuring efforts within the banking undefined, which ultimately ended in much more sweeping adjustments of the commercial procedure and long term deflation within the 2000s.

Additional info for Computer Security in Financial Organisations

Sample text

Like highwaymen, they have been most undeservedly glamourized in the popular imagination as daring heroes, when in fact they are nothing more than malevolent thieves. "Even as late at the 1960s and 1970s banks relied very heavily on physical transfer of funds between themselves. In those days, armed robbery could be a very profitable way of earning a living for those unscrupulous enough — and sufficiently unintimidated by the prospect of spending many years behind bars — to venture into it. "Since the late 1970s, however, money has mainly been moved between banks electronically.

This is precisely why computer crime is so dangerous for financial organizations, who will only be alerted to the dishonesty of a particular person when that person chooses to stray from the straight and narrow. What is more, even with the benefit of hindsight the indications that these apparently trustworthy people were going to become dishonest are extremely difficult to identify. "So why do these people make the momentous decision to turn against their employers? There is no simple answer to this.

49 Computer Security and Tlte Law This chapter is in three sections. The first part consists of an an article by Mark Tantam of Touche Ross. This article expands the introductory discussion above into an in-depth analysis of the problems and challenges faced by any attempt to legislate on computer security. Tantam has invested ids article with his extensive practical experience in investigating computer misuse, and — where computer-related fraud was involved — providing prosecuting counsel with evidence (often involving visual aids for the benefit of juries) to illustrate the mechanics of how the alleged crime took place.

Download PDF sample

Rated 4.09 of 5 – based on 35 votes