This Article 
 Bibliographic References 
 Add to: 
The Great Wall Syndrome
September/October 2005 (vol. 7 no. 5)
pp. 25-30
Michael Thelander, Chrome Systems
Typically, network security has tended to focus on building impenetrable outer walls. However, this article discusses a new threat that lifestyle computing devices such as iPods, PDAs, and small USB pen drives (which can now hold up to 60 Gbytes of data) can pose to corporations, and the need for IT managers to protect other corporate vulnerabilities: namely, PC ports. The author outlines various methods managers can use to protect company data, including setting up permission rules and enforcing acceptable use policies (AUPs).
Index Terms:
network security, PDAs, iPods, lifestyle computing, acceptable use policy (AUP), security risks, Intellectual property rights infringement, Vicarious liability, permissions, Moore's Law, IT Managers, PC security
Michael Thelander, "The Great Wall Syndrome," IT Professional, vol. 7, no. 5, pp. 25-30, Sept.-Oct. 2005, doi:10.1109/MITP.2005.126
Usage of this product signifies your acceptance of the Terms of Use.