Search results

1 – 4 of 4
Article
Publication date: 1 December 1996

This article has been withdrawn as it was published elsewhere and accidentally duplicated. The original article can be seen here: 10.1108/09685229510097250. When citing the…

482

Abstract

This article has been withdrawn as it was published elsewhere and accidentally duplicated. The original article can be seen here: 10.1108/09685229510097250. When citing the article, please cite: Gregory R. Doddrell, (1995), “Security environment reviews”, Information Management & Computer Security, Vol. 3 Iss: 4, pp. 3 - 14.

Details

Facilities, vol. 14 no. 12/13
Type: Research Article
ISSN: 0263-2772

Article
Publication date: 1 October 1995

Gregory R. Doddrell

Discusses the business vulnerabilities when using the Internet.Focuses on the logical barriers required to minimize these exposures.Explains why protection is required and…

5041

Abstract

Discusses the business vulnerabilities when using the Internet. Focuses on the logical barriers required to minimize these exposures. Explains why protection is required and discusses the role of firewalls as a “fire‐resistant” rather than “fire‐proof” security device. Illustrates a range of best practice firewalls and includes a collection of recent press clippings to give weight and interest to the discussion.

Details

Information Management & Computer Security, vol. 3 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 March 1996

Gregory R. Doddrell

Today, information technology is fundamental to the operation of most businesses, whether they are small companies or multinational corporations. In recent times, the…

1866

Abstract

Today, information technology is fundamental to the operation of most businesses, whether they are small companies or multinational corporations. In recent times, the implementation of local and wide area networks and the installation of computing equipment in office areas has brought information technology to nearly every working environment. The result is an increasing dependence on the availability, integrity and confidentiality of information stored and processed by these systems. As the trend shifts from “fortress” style central computer facilities to distributed systems located in generally less secure office environments, the risk of disruption increases, owing to lack of physical security, support services limitations and absence of site monitoring. The net result is higher business impact coupled with greater exposure. Identifies the elements that are at risk, discusses the issues businesses face when seeking to minimize exposures, suggests some practical solutions and describes some selected events that illustrate the hazards associated with having inadequate protection.

Details

Internet Research, vol. 6 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 October 1995

Gregory R. Doddrell

Today, information technology is fundamental to the operation ofmost businesses, whether they are small companies or multinationalcorporations. In recent times, the implementation…

1038

Abstract

Today, information technology is fundamental to the operation of most businesses, whether they are small companies or multinational corporations. In recent times, the implementation of local and wide area networks and the installation of computing equipment in office areas has brought information technology to nearly every working environment. The result is an increasing dependence on the availability, integrity and confidentiality of information stored and processed by these systems. As the trend shifts from “fortress” style central computer facilities to distributed systems located in generally less secure office environments, the risk of disruption increases, owing to lack of physical security, support services limitations and absence of site monitoring. The net result is higher business impact coupled with greater exposure. Identifies the elements that are at risk, discusses the issues businesses face when seeking to minimize exposures, suggests some practical solutions and describes some selected events that illustrate the hazards associated with having inadequate protection.

Details

Information Management & Computer Security, vol. 3 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 4 of 4