Issue No. 05 - September/October (2005 vol. 7)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2005.126
Michael Thelander , Chrome Systems
Typically, network security has tended to focus on building impenetrable outer walls. However, this article discusses a new threat that lifestyle computing devices such as iPods, PDAs, and small USB pen drives (which can now hold up to 60 Gbytes of data) can pose to corporations, and the need for IT managers to protect other corporate vulnerabilities: namely, PC ports. The author outlines various methods managers can use to protect company data, including setting up permission rules and enforcing acceptable use policies (AUPs).
network security, PDAs, iPods, lifestyle computing, acceptable use policy (AUP), security risks, Intellectual property rights infringement, Vicarious liability, permissions, Moore's Law, IT Managers, PC security
Michael Thelander, "The Great Wall Syndrome", IT Professional, vol. 7, no. , pp. 25-30, September/October 2005, doi:10.1109/MITP.2005.126