Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Information security and the Internet

Information security and the Internet Today, information technology is fundamental to the operation of most businesses, whether they are small companies or multinational corporations. In recent times, the implementation of local and wide area networks and the installation of computing equipment in office areas has brought information technology to nearly every working environment. The result is an increasing dependence on the availability, integrity and confidentiality of information stored and processed by these systems. As the trend shifts from “fortress” style central computer facilities to distributed systems located in generally less secure office environments, the risk of disruption increases, owing to lack of physical security, support services limitations and absence of site monitoring. The net result is higher business impact coupled with greater exposure. Identifies the elements that are at risk, discusses the issues businesses face when seeking to minimize exposures, suggests some practical solutions and describes some selected events that illustrate the hazards associated with having inadequate protection. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Internet Research Emerald Publishing

Information security and the Internet

Internet Research , Volume 6 (1): 5 – Mar 1, 1996

Loading next page...
 
/lp/emerald-publishing/information-security-and-the-internet-01o5biIcjG

References (1)

Publisher
Emerald Publishing
Copyright
Copyright © 1996 MCB UP Ltd. All rights reserved.
ISSN
1066-2243
DOI
10.1108/EUM0000000000010
Publisher site
See Article on Publisher Site

Abstract

Today, information technology is fundamental to the operation of most businesses, whether they are small companies or multinational corporations. In recent times, the implementation of local and wide area networks and the installation of computing equipment in office areas has brought information technology to nearly every working environment. The result is an increasing dependence on the availability, integrity and confidentiality of information stored and processed by these systems. As the trend shifts from “fortress” style central computer facilities to distributed systems located in generally less secure office environments, the risk of disruption increases, owing to lack of physical security, support services limitations and absence of site monitoring. The net result is higher business impact coupled with greater exposure. Identifies the elements that are at risk, discusses the issues businesses face when seeking to minimize exposures, suggests some practical solutions and describes some selected events that illustrate the hazards associated with having inadequate protection.

Journal

Internet ResearchEmerald Publishing

Published: Mar 1, 1996

Keywords: Access control; Computer hardware; Information technology; Location; Risk

There are no references for this article.