There is a hierarchically related set of fundamental security technologies that have been used (sometimes without need for the hierarchy) in the late 1970s and 80s to protect information. The critical assumptions which provided the rationale for protection of information in those times are now challenged by the networked information resource environment of the 1990s. The weakest link in most information security systems is the reliance upon inappropriate methods of identifying and authenticating authorized users to the exclusion of all others. Proposes token based, two‐factor identity authenticator as a solution which reconciles the security hierarchy with the typical 1990s distributed information environment.
Weiss, K. (1994), "To Serve and Protect: : Reconciling Information Protection with LAN Environments", Information Management & Computer Security, Vol. 2 No. 3, pp. 19-25. https://doi.org/10.1108/09685229410792934Download as .RIS
MCB UP Ltd
Copyright © 1994, MCB UP Limited