Security without bandwidth strain

September 1996
Communications News;Sep96, Vol. 33 Issue 9, p8
Trade Publication
Focuses on the Internet Security Association Key Management Protocol (ISAKMP). Goal of the ISAKMP; Features of the security architecture.


Related Articles

  • Helpful tips to keep business computers safe from hackers. Freudenberg, Paul // Business Journal Serving Fresno & the Central San Joaquin Valley;01/19/98, Issue 322253, p23 

    Opinion. Offers insights on preventing hackers from intruding into the confidential data stored in computers of business enterprises. Use of firewalls; Use of cryptic phrases that combine uppercase and lowercase letters as passwords; Inclusion of add-on encryption schemes to computers.

  • Businesses ignore computer security.  // Internal Auditor;Jun96, Vol. 53 Issue 3, p11 

    Reports that organizations in North America and Europe are neglecting computer security. Ignorance of British finance directors about computer security issues; Computer-related theft in Great Britain; Other findings in a KPMG survey of senior-level finance executives.

  • Computer security: It's best to lock it, pocket the key. Ellingson, Dave // Las Vegas Business Press;2/27/95, Vol. 12 Issue 8, p18 

    Discusses how managers can ensure computer security. Netscape's installation of security measures to protect transmission of credit card numbers; Proposed legislation on computer security.

  • You're a what? Data security analyst. Mariani, Matthew // Occupational Outlook Quarterly;Summer94, Vol. 38 Issue 2, p39 

    Describes the job of a data security analyst using Jamie Jeffers of Fannie Mae as an example. How the data security analyst acts as a data detective; Protecting computer data systems from having information stolen or altered without permission; Jamie's background with computers.

  • Before disaster strikes: 12 steps to minimize computer losses. Storkman, Wayne D. // Outlook;Spring94, Vol. 62 Issue 1, 4th Annual Computer... p10 

    Offers steps to minimize computer system failure or data loss related to a disaster. Performing regular and complete backups; Practicing restoring from backups; Documenting backup procedures; Storing backups off-site or out of state; Prearranging alternative computer facilities and...

  • Computer system buddies. McCready, Donald C. // Ohio CPA Journal;Dec94, Vol. 53 Issue 6, p47 

    Discusses several preventive measures in using computers. Backup devices; Uninterruptible power supply; Diagnostic utilities; Virus protection software; Environmental control equipment; Complementary metal oxide semiconductor (CMOS) printout.

  • Locking up your laptop. M.M.S.; O'Malley, Chris // Popular Science;May93, Vol. 242 Issue 5, p42 

    Comments how Kensington Microware of San Mateo, Calif., aims to set a standard for portable security with its MicroSaver Security System, a plug-shaped lock that fits into a slot built into the computer and ties it to a desk or table with a six-foot steel cable. Other solutions from PC Guardian...

  • Responding to privacy concerns of consumers. Kakalik, John S.; Wright, Marie A. // Review of Business;Fall96, Vol. 18 Issue 1, p15 

    Reports on threats to the privacy of consumers, and the conflict between commercialization of personal information, resulting from advances in technology. Reference to information on data banks accessed by computer systems; Question on the seriousness of the threat to privacy; Information on...

  • Computer security: Deciphering the FUD factor. Boyd, John // Computing Japan;Mar1998, Vol. 5 Issue 3, p23 

    Focuses on the FUD factor (Fear, Uncertainty, and Doubt), relating to computer security. Comments from Koji Natgatsuna, an electronic commerce analyst with the Gartner Group Japan; Detailed information on electronic cryptography; Reference to encryption in Japan; Discussion on the FUD factor...

  • Legislators mull computer security. Rodger, Will // Inter@ctive Week;02/17/97, Vol. 4 Issue 4, p34 

    Addresses the issue of the lack of computer security in the United States, while providing information on the explanation of the issue by a panel of six computer scientists before the House Subcommittee on Technology. Reasons for the increased attention given to the issue; Information on the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics