TITLE

Net surfers: Risky corporate business

PUB. DATE
September 1996
SOURCE
Communications News;Sep96, Vol. 33 Issue 9, p8
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the findings of a survey on security policies concerning employees' use of the Internet and other online services. Restrictions on access and downloading of data; Recommendation for the upgrading of formal policies on employees' use of information and communications technologies.
ACCESSION #
9609226259

 

Related Articles

  • Zen and the Art of Internet Security. Hansen, Bradford // Air Conditioning Heating & Refrigeration News;11/27/2000, Vol. 211 Issue 13, p1 

    Recommends Internet and computer security practices in the United States. Establishment of a system to thwart hackers; Importance of choosing passwords which are harder to guess.

  • Securing Web services. Briggs, Barry // InfoWorld;6/17/2002, Vol. 24 Issue 24, p58 

    Focuses on Web services security. Factors to consider in exploiting the value of Web services; Sample of problems brought by Web services; Efforts of IBM, Microsoft and VeriSign.

  • Privacy on the Internet.  // Caribbean Business;12/31/1998, Vol. 26 Issue 52, p41 

    Provides tips on how to safeguard privacy on the Internet.

  • Notes on Internet privacy. Perl, H.W. // Caribbean Business;10/31/1996, Vol. 24 Issue 43, p11 

    Stresses the need for computer users using the Internet for electronic mail and other purposes to be wary of what security measures to take. Internet service providers' policies meant to protect customers' privacy; Categories of Internet security concerns; Usual method of securing electronic...

  • Bugged by Internet snoops? Fight back. Tongas, Theodora // PCWorld;Mar1998, Vol. 16 Issue 3, p72 

    Looks at Web sites that offer information related to privacy on the Internet. The Electronic Privacy Information Center as posting regular updates on legislation and regulations, as well resources related privacy; The Anonymizer site acting as an intermediary between you and any of the Web site...

  • Firewalls: Not As Safe As You Thought. Hansen, Mark D. // Professional Safety;Jun99, Vol. 44 Issue 6, p10 

    Presents guidelines for selecting and implementing a firewall, a component of a comprehensive security policy in the Internet. Information on the security feature of a firewall; Key firewall characteristics; Importance for an additional computer security aside from firewalls.

  • Stopping the cookie monster improves Internet security. Ferguson, Kevin // Las Vegas Business Press;05/01/2000, Vol. 17 Issue 17, p7 

    Discusses the benefits of using so-called cookies to improve Internet security. Functions of cookies; Features of the cookie-blocking software program Internet Junkbuster 2.0.2.

  • Reference corner: Security. Walters, Kevin // PC Week;04/28/97, Vol. 14 Issue 17, p128 

    Presents information relevant to computer and Internet security. World Wide Web sites from Check Point Software Technologies Ltd. and Raptor Systems Inc.; The book `How to Handle Internet Electronic Information Security: Risks, Controls & Product Guide,' from Baseline Software Inc.; Conferences...

  • If you can reach them, they can reach you. Dutcher, William // PC Week;6/19/95, Vol. 13 Issue 24, p90 

    Presents a discussion on how to maintain security when connected to the Internet. Architecture of the firewall; Steps in the installation of a firewall; Identification of the best physical location for the firewall before building it; Configuration; Other gateways.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics