This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Great Wall Syndrome
September/October 2005 (vol. 7 no. 5)
pp. 25-30
Michael Thelander, Chrome Systems
Typically, network security has tended to focus on building impenetrable outer walls. However, this article discusses a new threat that lifestyle computing devices such as iPods, PDAs, and small USB pen drives (which can now hold up to 60 Gbytes of data) can pose to corporations, and the need for IT managers to protect other corporate vulnerabilities: namely, PC ports. The author outlines various methods managers can use to protect company data, including setting up permission rules and enforcing acceptable use policies (AUPs).
Index Terms:
network security, PDAs, iPods, lifestyle computing, acceptable use policy (AUP), security risks, Intellectual property rights infringement, Vicarious liability, permissions, Moore's Law, IT Managers, PC security
Citation:
Michael Thelander, "The Great Wall Syndrome," IT Professional, vol. 7, no. 5, pp. 25-30, Sept.-Oct. 2005, doi:10.1109/MITP.2005.126
Usage of this product signifies your acceptance of the Terms of Use.