Safety zone

The extraordinary technological advancements that have occurred during the last twenty years have changed the way the world works. But with these innovations have come serious security concerns. In today's business and consumer environment, conversations about such concerns as identity theft are now commonplace. This article examines how several organizations are confronting the electronic security threats that are now commonly plaguing both organizations and individuals. In doing so, it explains the impact of identity theft and lists three methods that identity thieves frequently use; it discusses the United States Federal Government's effort (known as HSPD 12) to curb the stealing of federal employee identities--and the internal resistance the government is facing in attempting to implement this effort. It then describes techniques that organizations can use to implement three approaches for curbing security breaches, approaches involving policy development, encryption and authentication, and embedded secur
registered user content locked

Log in or join PMI to gain access

or Account Registration

Advertisement

Advertisement

Related Content

Advertisement

Publishing or acceptance of an advertisement is neither a guarantee nor endorsement of the advertiser's product or service. View advertising policy.