Abstract

This chapter focuses on the selection of appropriate security elements. The kinds, variety, and severity of security vulnerabilities found in networked microcomputers are markedly different from those encountered in data centers or time-sharing applications where a number of terminal devices are connected to a central mainframe. In contrast to the traditional physical and logical controls implemented at one place, which are typical of a data center security scheme, a network of computers, workstations, and other devices requires the following information security measures: (1) control of access to all information files accessible from the home network or from connected foreign networks; (2) control of activity once authorized entry to a file has been allowed; (3) control of access to network traffic; (4) establishment of effective identification and authentication means for each network user and for each network component; (5) control of access to network resources such as clearinghouses, communications controllers, front ends, and various servers; and (6) control of information propagation to prevent distribution or leaking to unauthorized network stations or users.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.