Information security and the Internet

被引:3
作者
Doddrell, GR
机构
[1] Information Security, KPMG Information Solutions, Melbourne, Vic.
来源
INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY | 1996年 / 6卷 / 01期
关键词
access control; computer hardware; information technology; location; risk;
D O I
10.1108/EUM0000000000010
中图分类号
F [经济];
学科分类号
02 ;
摘要
Today, information technology is fundamental to the operation of most businesses, whether they are small companies or multinational corporations. In recent times, the implementation of local and wide area networks and the installation of computing equipment in office areas has brought information technology to nearly every working environment. The result is an increasing dependence on the availability, integrity and confidentiality of information stored and processed by these systems. As the trend shifts from ''fortress'' style central computer facilities to distributed systems located in generally less secure office environments, the risk of disruption increases, owing to lack of physical security, support services limitations and absence of site monitoring. The net result is higher business impact coupled with greater exposure. Identifies the elements that are at risk, discusses the issues businesses face when seeking to minimize exposures, suggests some practical solutions and describes some selected events that illustrate the hazards associated with having inadequate protection.
引用
收藏
页码:5 / &
页数:6
相关论文
共 9 条
[1]  
[Anonymous], 1995, BUILDING INTERNET FI
[2]  
COMER DE, INTERNETWORKING TCP
[3]  
CRAWFORD F, 1995, AUSTRALIAN 0613
[4]  
GARFINKLE S, 1991, PRACTICAL UNIX SECUR
[5]  
HILVERT J, 1995, AUSTRALIAN 0509
[6]  
HOREY J, 1995, AUSTRALIAN 0606
[7]  
HUNT C, 1992, TCP IP NETWORK ADM
[8]  
KEHOE BP, ZEN ART INTERNET
[9]  
1995, HERALD SUN 0715