Resources
See latest resources ยป
Defending against cyber warfare

Defending against cyber warfare

Source:

An overview paper from the US General Accounting Office describing state-of-the-art security technologies and practices that can be used to defend computer systems against cyber attacks.

The GAO has categorised 18 specific technologies according to the control functionality they provide and described what the technologies do, how they work, and their reported effectiveness. The five control categories identified include, access controls, systems integrity, cryptography, audit and monitoring, and configuration management and assurance.

The discussion of each technology is technical in nature and is intended to assist in the identification and selection of cyber security technologies for deployment.

Download the document now 1.1Mb - PDF

Comments: (0)

White Paper resources
See all White Paper resources »
Using social media to define a better customer banking experience
/white paper

Using social media to define a better customer banking experience

Finextra sat down with Keith Moor, CMO, Santander UK to discuss how retail banking in the mobile channel will change within the next two to five years, how the advent of smartphones has created more choice for the consumer in how they interact with their bank and how Santander worked with Facebook to learn what their customers want from banking channels.

The Innovation Game: Escaping Legacy with New Technology
/white paper

The Innovation Game: Escaping Legacy with New Technology

Banks need to innovate but are held back by layers of legacy technology which inhibits their ability to adapt and evolve. How can they implement change without risking the stable operation of core systems and services? This report provides the answers to this vital question.

MiFID II Transaction Reporting: Be in Control
/white paper

MiFID II Transaction Reporting: Be in Control

Like many other regulations coming into force in the next 36 months, MiFID II is calling for enhanced monitoring, transparency and control of the end-to-end trade lifecycle.