TITLE

Unplugged data can also be hack-proof data

AUTHOR(S)
Biggs, Maggie
PUB. DATE
February 2001
SOURCE
InfoWorld;02/26/2001, Vol. 23 Issue 9, p61
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on the security options available for wireless local area network (WLAN). Potential security hazards for WLAN; Technique that managers should use for the proper use of WLAN; Concern of information technology managers in implementing WLAN.
ACCESSION #
4134909

 

Related Articles

  • The malevolence of mobile code. Parker, Don // SC Magazine: For IT Security Professionals (UK Edition);Dec2003, p82 

    This article discusses security practices that a company can introduce to lower security risks in using mobile codes. 2003 has been another banner year for various types of malicious mobile code. The dangers of mobile code have been known for some time now. However, many companies still fail to...

  • The answer to the problem. Brockett, Douglas // SC Magazine: For IT Security Professionals (UK Edition);Dec2003, p47 

    This article discusses the proliferation of wireless local area networks (LAN) in businesses in Great Britain as of December 2003. A recent survey of directors and senior information technology managers at more than 400 British firms, sponsored by SonicWALL, confirms that wireless LAN are a...

  • No wires means more efficiency. Gabriel, Caroline // SC Magazine: For IT Security Professionals (UK Edition);Dec2003, p48 

    This article highlights security risks in adopting wireless technologies by U.S. corporations as of December 2003. A massive 87 percent of companies plan to employ wireless technology in major applications in the next three years and almost half are using them already. Yet 78 percent seen...

  • Who's Watching The Store?  // MAN: Modern Applications News;Dec2004, Vol. 38 Issue 12, p52 

    Provides information on managing and securing the business records of a company. Database security problems faced by a company; Tips on configuring the company's local area network (LAN) against unauthorized intrusions; Importance of an efficient LAN and information technology function to the...

  • Analysis on Wireless LAN Security Issues and Security Implementation. QingChao Jiang // Advanced Materials Research;2014, Issue 1030-1032, p1657 

    With the global population of informatization and digitization, network technology is playing a very important role in people's lives. The role of wireless LAN applications is especially significant. People's daily lives and work are no longer confined to paper or wired connection, but gradually...

  • SonicWall offers versatile security platform. Greene, Tim // Network World;9/5/2005, Vol. 22 Issue 35, p20 

    This article reports that SonicWall Inc. will introduce a new multifunction security device that can scan for a laundry list of malicious activity within corporate networks and keep outbreaks contained to local area network segments. Called Pro 4100, the appliance performs anti-virus,...

  • How safe is your LAN? Garceau, Linda R.; Poznanski, Peter F. // CMA Magazine;Apr95, Vol. 69 Issue 3, p8 

    Focuses on the security measures intended for users of local area networks. False sense of security in the password protection system; Ways for the reduction of the opportunity for unauthorized system access.

  • Good LAN security requires analysis of corporate data. Spiegel, Leo // InfoWorld;12/27/93 - 1/3/94, Vol. 15/16 Issue 52/1, p49 

    Reports on local area network (LAN) security planning. Development of an information security plan; Determination of the value of corporate information; Determination of the systems, applications and information required to support it; Examination of the sensitivity or confidentiality of the...

  • Need a good New Year's resolution? Try this: I promise to secure my network. Merenbloom, Paul // InfoWorld;12/19/94, Vol. 16 Issue 51, p64 

    Discusses how user-companies can secure their local area networks. Establishment of responsibility, proactive auditing and enforcement systems; Documentation of all potential access/compromise points; Hiring of external consultants; Annual full-scale system audit; Provision of limits in the system.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics