TY - JOUR AB - There is a hierarchically related set of fundamental security technologies that have been used (sometimes without need for the hierarchy) in the late 1970s and 80s to protect information. The critical assumptions which provided the rationale for protection of information in those times are now challenged by the networked information resource environment of the 1990s. The weakest link in most information security systems is the reliance upon inappropriate methods of identifying and authenticating authorized users to the exclusion of all others. Proposes token based, two‐factor identity authenticator as a solution which reconciles the security hierarchy with the typical 1990s distributed information environment. VL - 2 IS - 3 SN - 0968-5227 DO - 10.1108/09685229410792934 UR - https://doi.org/10.1108/09685229410792934 AU - Weiss Kenneth P. PY - 1994 Y1 - 1994/01/01 TI - To Serve and Protect: : Reconciling Information Protection with LAN Environments T2 - Information Management & Computer Security PB - MCB UP Ltd SP - 19 EP - 25 Y2 - 2024/04/25 ER -