Security for individual computing environments
This issue of the SIGICE Bulletin has a focus of those aspects of security called secrecy and availability. Many of us, like the authors of one of the articles, asks the question, "Is security for PC's and workstations an oxymoron?" Individual Computing Environments (ICE), i.e., PC...
Gespeichert in:
Veröffentlicht in: | SIGICE bulletin 1994-07, Vol.20 (1), p.3-6 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | This issue of the
SIGICE Bulletin
has a focus of those aspects of security called
secrecy
and
availability.
Many of us, like the authors of one of the articles, asks the question, "Is security for PC's and workstations an oxymoron?" Individual Computing Environments (ICE), i.e., PC's, workstations, etc. often appear to most of us as being extremely vulnerable to a variety of secrecy and availability breaches with little one can do about the problems. What you will learn from the articles presented in this volume is that despite the vulnerability, these machines can be secured to the point of reducing the risk to a level one is willing to tolerate. The solutions suggested go beyond the commonly used virus detection and elimination software. I urge all who own or use individual computing environments on which data and programs reside to read this series of articles. |
---|---|
ISSN: | 1558-1144 0893-2875 |
DOI: | 10.1145/181823.184667 |