Coming to grips with intranet security

Kobielus, James
August 1997
Network World;08/18/97, Vol. 14 Issue 33, Intranet p12
Trade Publication
Focuses on network managers' efforts to enhance the security of intranets. Efforts to address the vulnerabilities of browsers; Secure Sockets Layer cryptography protocols; Security concerns about Java and ActiveX; Server security; Gateway security.


Related Articles

  • Cisco, partners push blanket security initiative. McGarvey, Joe // Inter@ctive Week;3/3/97, Vol. 4 Issue 6, p13 

    Reports on Cisco Systems Inc.'s initiative to provide corporations a framework for securing companywide computer networks in the United States. Reduction of the cost and complexity of intranet computer security; Strategy to support existing technology; Protest from Checkpoint Software Inc.

  • THE Changing Face OF IDENTITY MANAGEMENT. Kho, Nancy David // EContent;Apr2009, Vol. 32 Issue 3, p20 

    This article emphasizes that the need for flexible and secure identity and access management has taken on new urgency for enterprises as so much enterprise information reside online and applications both inside and outside of firewalls overlap, and software-as-service becoming more and more part...

  • Network Security Management System Based on Digital China. Wenjie Xu; Fangqin Xu; Haifeng Lu // Applied Mechanics & Materials;2014, Issue 568-570, p1384 

    With the popularity of the Internet, web applications have become an essential part of business development. At the same time, network security issues have become increasingly prominent, enterprises feel the convenience brought by the network, while they are also facing a variety of attacks and...

  • Intranet security. Canterucci, Jim // Training & Development;Feb97, Vol. 51 Issue 2, p47 

    Discusses intranet security. Issues that should be addressed by a security plan; Definition of several intranet security terms; Suggested resources on security issues concerning intranets.

  • New Ways To Lock Up Key Assets. Babcock, Charles // Inter@ctive Week;11/23/98, Vol. 5 Issue 46, p30 

    Deals challenges in intranet security. Action to be taken to protect corporate resources; Emergence of intrusion detection systems.

  • Tunnel vision. Paul, Lauren Gibbons // PC Week;9/16/96, Vol. 13 Issue 37, pE1 

    Reports that many companies are eyeing virtual private networks to forge a secure tunnel in the very public Internet. The threat to the traffic patterns of local area networks (LAN) and wide area networks (WAN) posed by the explosion of intranet/Internet access; Simon & Schuster Inc., which...

  • Cisco and HP debuting new security wares. Moeller, Michael // PC Week;06/02/97, Vol. 14 Issue 22, p23 

    Discusses products being released during the summer of 1997 designed to expand the security capabilities of intranets. PIX Firewall 4.0 from Cisco Systems Inc.; The demonstration of the Layer 2 Tunneling Protocol (L2TP) developed by Cisco and Microsoft Corp.; The release by Hewlett-Packard Co....

  • IT looks to fend off hackers inside and out. Moeller, Michael // PC Week;1/27/97, Vol. 14 Issue 4, p16 

    Looks at means used by companies to protect against threats to the integrity of their corporate intranets. Corporate policies for intranet security; Various threats; Masquerading; Eavesdropping; Interception; Address spoofing; Data manipulation; Dictionary attack; Replay attack; Denial of...

  • How secure is secure? Fotsch, Edward // hfm (Healthcare Financial Management);Nov96, Vol. 50 Issue 11, p30 

    Discusses the effectiveness of Intranet security access systems. User password identification; Firewalls, gateways that route and monitor data traffic between networks; Browser-based security systems; Security server systems; Token- and challenge-based systems; Object-based security systems;...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics