The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2005 vol.7)
pp: 25-30
Michael Thelander , Chrome Systems
ABSTRACT
Typically, network security has tended to focus on building impenetrable outer walls. However, this article discusses a new threat that lifestyle computing devices such as iPods, PDAs, and small USB pen drives (which can now hold up to 60 Gbytes of data) can pose to corporations, and the need for IT managers to protect other corporate vulnerabilities: namely, PC ports. The author outlines various methods managers can use to protect company data, including setting up permission rules and enforcing acceptable use policies (AUPs).
INDEX TERMS
network security, PDAs, iPods, lifestyle computing, acceptable use policy (AUP), security risks, Intellectual property rights infringement, Vicarious liability, permissions, Moore's Law, IT Managers, PC security
CITATION
Michael Thelander, "The Great Wall Syndrome", IT Professional, vol.7, no. 5, pp. 25-30, September/October 2005, doi:10.1109/MITP.2005.126
418 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool