TITLE

Browser weakness compromises remote users

AUTHOR(S)
Saran, Cliff
PUB. DATE
March 2004
SOURCE
Computer Weekly;3/9/2004, p16
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
If the Jericho Forum's deperimeterisation security model is to work, users and suppliers will have to tackle the problem of providing access to corporate networks from an increasingly wide range of devices. Currently, most business users connect securely to a corporate network via desktop PCs within the boundary of a company. Mobile access, though increasingly common, is far less secure. Members of the Jericho Forum are planning to look at the security impact of connecting various types of devices to a corporate network. For deperimeterisation to take off, every device needs to be treated as inherently insecure. The draft manifesto identified a number of problems with today's mobile technology; including the possibility of virus attacks and the risks of removable media. Removable media, just like floppy disks on the PCs, could, for example, be used to introduce viruses. The draft document also highlighted some progress in addressing mobile security, for example, that mobile phones require two levels of user authentication via the Sin and Pin code. Hardware tend to run personal productivity programmes, such as word processors or web browsers, pose another set of risks.
ACCESSION #
12830333

 

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics