Facing up to security

Gibbs, Mark
September 1997
Network World;09/22/97, Vol. 14 Issue 38, Intranet p10
Trade Publication
Focuses on the use of biometrics, the measurement of a person's biological attributes, to establish identity in intranet connections and services. Product developments; Face-recognition products that could be used to secure an intranet; Information accessibility.


Related Articles

  • Intranet security. Canterucci, Jim // Training & Development;Feb97, Vol. 51 Issue 2, p47 

    Discusses intranet security. Issues that should be addressed by a security plan; Definition of several intranet security terms; Suggested resources on security issues concerning intranets.

  • New Ways To Lock Up Key Assets. Babcock, Charles // Inter@ctive Week;11/23/98, Vol. 5 Issue 46, p30 

    Deals challenges in intranet security. Action to be taken to protect corporate resources; Emergence of intrusion detection systems.

  • Tunnel vision. Paul, Lauren Gibbons // PC Week;9/16/96, Vol. 13 Issue 37, pE1 

    Reports that many companies are eyeing virtual private networks to forge a secure tunnel in the very public Internet. The threat to the traffic patterns of local area networks (LAN) and wide area networks (WAN) posed by the explosion of intranet/Internet access; Simon & Schuster Inc., which...

  • Cisco and HP debuting new security wares. Moeller, Michael // PC Week;06/02/97, Vol. 14 Issue 22, p23 

    Discusses products being released during the summer of 1997 designed to expand the security capabilities of intranets. PIX Firewall 4.0 from Cisco Systems Inc.; The demonstration of the Layer 2 Tunneling Protocol (L2TP) developed by Cisco and Microsoft Corp.; The release by Hewlett-Packard Co....

  • IT looks to fend off hackers inside and out. Moeller, Michael // PC Week;1/27/97, Vol. 14 Issue 4, p16 

    Looks at means used by companies to protect against threats to the integrity of their corporate intranets. Corporate policies for intranet security; Various threats; Masquerading; Eavesdropping; Interception; Address spoofing; Data manipulation; Dictionary attack; Replay attack; Denial of...

  • How secure is secure? Fotsch, Edward // hfm (Healthcare Financial Management);Nov96, Vol. 50 Issue 11, p30 

    Discusses the effectiveness of Intranet security access systems. User password identification; Firewalls, gateways that route and monitor data traffic between networks; Browser-based security systems; Security server systems; Token- and challenge-based systems; Object-based security systems;...

  • ValiCert carves out secure niche.  // Inter@ctive Week;08/03/98, Vol. 5 Issue 29, p28 

    Reports on the entry of ValiCert Inc. into the public key market that deals with protecting intranets. Information on two sections of the market called encryption and certificate authorities; Value of the market in 1997; Details on agreements that ValiCert has entered into; Reference to...

  • Entrust secures intranet connections. Nelson, Matthew // InfoWorld;03/02/98, Vol. 20 Issue 9, p76 

    Announces Entrust Technologies' plan to release the Entrust/Access application for creating secure connections to intranets across the Internet using IPSec-enabled client systems. Application; Features; Contact information.

  • Your digital backside is on the line online. Lundquist, Eric // PC Week;1/27/97, Vol. 14 Issue 4, p150 

    Discusses the security of intranets using firewalls. The assertion that most computing hacking is done using force not subtlety; Dangers to security due to the Internet; The book `Ethical Hackers for Hire,' by Erin Callaway.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics