Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Paris : OECD Publishing
    ISBN: 9789264056596
    Language: English
    Pages: Online-Ressource (138 p.)
    Parallel Title: Druckausg.
    Parallel Title: Druckausg. Online identity theft
    DDC: 364.16/33
    RVK:
    Keywords: Phishing ; Identity theft ; Internet fraud ; Identity theft Prevention ; Governance ; Science and Technology ; Identitätsdiebstahl ; Phishing
    Abstract: Using widely available Internet tools, internet thieves trick unsuspecting computer users into providing personal data, which they then use for illicit purposes, causing mistrust of online payment and banking services. This book defines identity theft and studies how it is perpetrated, outlines what is being done to combat the major types of ID theft, and recommends specific ways that ID theft can be addressed in an effective, global manner.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9789264025516
    Language: English
    Pages: Online-Ressource (132 p.)
    Series Statement: OECD Reviews of Risk Management Policies
    Parallel Title: Erscheint auch als Norway
    RVK:
    RVK:
    Keywords: Datensicherheit ; Norwegen ; Science and Technology ; Norway ; Norwegen ; Computersicherheit ; Internet ; Datenschutz ; Innere Sicherheit
    Abstract: The development of information and communication technologies and networks, and in particular that of the Internet, has gone hand in hand with the emergence of new types of malevolent actions called cyber-crime: viruses, worms, Trojan horses, and the like. While a number of factors make a strong case for governmental action in the area of information security, there are also important limits to what governments can achieve. This review, the first in a series of risk management policy reviews being conducted by the OECD, identifies areas of good practice in Norway's policies for information security, as well as areas where improvements could be made. For areas that could benefit from improvement, it proposes opportunities for action and, when possible, suggests alternatives.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9789264162426
    Language: English
    Pages: Online-Ressource (40 p)
    Parallel Title: Druckausg.
    Parallel Title: Parallelausg. La politique de cryptographie ; les lignes directrices et les questions actuelles ; Les lignes directrices régissant la politique de cryptographie de l'OCDE et le rapport sur la politique de cryptographie ; contexte et questions actuelles
    Parallel Title: Druckausg. Organisation for Economic Co-Operation and Development Cryptography policy
    RVK:
    Keywords: Datensicherheit ; OECD-Staaten ; Science and Technology
    Abstract: Cryptography is one of the technological means to provide security for data on information and communications systems. It can be used to protect the confidentiality of data, such as financial or personal data, whether that data is in storage or in transit. Cryptography can also be used to verify the integrity of data by revealing whether data has been altered and identifying the person or device that sent it. These techniques are critical to the development and use of national and global information and communications networks and technologies, as well as the development of electronic commerce. This book includes the Recommendation of the OECD Council concerning Guidelines for Cryptography Policy, the text of the Guidelines itself, and a report which explains the context for the guidelines and the basic issues involved in the cryptography policy debate.
    Note: Franz. Ausg. u.d.T.: La politique de cryptographie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...