Byres, Eric
March 2007
InTech;Mar2007, Vol. 54 Issue 3, p42
The article discusses the concept of defense in depth in computer security systems. The article points out that although the firewall is an excellent weapon in the security toolkit, many security breaches occur through secondary pathways such as dial-up connections, wireless systems and mobile devices. For desktop computers, patching and other antivirus solutions are second levels of defense. For devices like programmable logic controllers and remote thermal units, industrial security appliances are employed.


Related Articles

  • Performance Evaluation of AODV Protocol under DDoS Attacks in MANET. Saraeian, Shideh; Adibniya, Fazllolah; GhasemZadeh, Mohammad; Abtahi, SeyedAzim // Proceedings of World Academy of Science: Engineering & Technolog;Sep2008, Vol. 45, p501 

    ad hoc networks are a new wireless networking pattern for mobile hosts. These networks are one of the autonomous systems that composite of mobile nodes with wireless links between them. Each node in these networks not only as an end system also can operate instead of a router and can forward...

  • Site sheds light on workflow jargon. Caton, Michael // eWeek;2/21/2005, Vol. 22 Issue 8, p50 

    The article reports that Mobile Edge has launched computer carriers with a Wireless Security Shield Pocket, made of radio-blocking material that forms a physical firewall between mobile devices and hackers or virus-infected Bluetooth devices, big enough to accommodate a PDA and a small cell...

  • Criminal Cyber Networks Have Begun Creating Viruses To Hack Into Mobile Phones In Order.  // AirGuide Online.com;10/5/2009, p1 

    The article focuses on the increasing cyber threat posed by criminal cyber networks to steal sensitive information from mobile phones. It is reported that cyber networks have begun creating viruses to hack into mobile phones. It has been done because these days technology savvy consumers are...

  • A Mobile Security Battle. Jain, Sunil // Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p66 

    The article focuses on the threat of the vulnerability of mobile computing and communications in the security systems industry in the U.S. Internet-based computing has brought with it a steady increase in the number of types of security threats. The growth of mobility has spawned several...

  • Don't Be Out'smart'ed. Panettieri, Joseph C. // T H E Journal;Feb2006, Vol. 33 Issue 7, p18 

    The article discusses the threats posed by smart mobile phones to data security. More than 100 viruses now target smart phones running mobile operating systems from several high technology companies including Microsoft Corp. Consider the Cabir worm, which targets mobile phones running Symbian OS...

  • Trojan hits Windows PDAs for first time. Bedbarz, Ann // Network World;8/9/2004, Vol. 21 Issue 32, p1 

    After finding the third malicious program targeting wireless devices in fewer than 60 days, security specialists are warning that it is only a matter of time before attackers will launch a serious attack against mobile telephones and personal digital assistants (PDA). Malicious programs...

  • WIRELESS SCRAMBLES TO BATTEN DOWN THE HATCHES. Mehta, Stephanie N. // Fortune;10/18/2004, Vol. 150 Issue 8, p275 

    The article discusses how the proliferation of corporate Wi-Fi systems, illicit and approved, has created a new wave of security challenges for Internet technology departments. The very thing that makes Wi-Fi so attractive to companies--its ability to transmit large streams of data to every...

  • Improving Mobile Device Classification using Security Events for Preventing Wireless Intrusion. Hyeokchan Kwon; Sin-Hyo Kim // International Journal of Security & Its Applications;Nov2013, Vol. 7 Issue 6, p181 

    In current wireless intrusion prevention system (WIPS), the mobile devices are classified into one of three or four categories by classification algorithm for preventing wireless intrusion. But such a classification mechanism has difficulty to delicate control the wireless access of mobile...

  • Trends in Mobile Device Security. James, Jeff // Windows IT Pro;Jan2012, Vol. 18 Issue 1, p62 

    The article explores the state of mobile device security in 2012. With the Android platform emerging as the dominant smartphone operating system (OS), there have been plenty of news on Android malware ranging from infected apps to key-logger applications. Embracing clear security policies,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics