To read this content please select one of the options below:

To Serve and Protect: : Reconciling Information Protection with LAN Environments

Kenneth P. Weiss (Chairman and Chief Technical Officer of Security Dynamics, headquartered in Cambridge, MA, USA.)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 August 1994

542

Abstract

There is a hierarchically related set of fundamental security technologies that have been used (sometimes without need for the hierarchy) in the late 1970s and 80s to protect information. The critical assumptions which provided the rationale for protection of information in those times are now challenged by the networked information resource environment of the 1990s. The weakest link in most information security systems is the reliance upon inappropriate methods of identifying and authenticating authorized users to the exclusion of all others. Proposes token based, two‐factor identity authenticator as a solution which reconciles the security hierarchy with the typical 1990s distributed information environment.

Keywords

Citation

Weiss, K.P. (1994), "To Serve and Protect: : Reconciling Information Protection with LAN Environments", Information Management & Computer Security, Vol. 2 No. 3, pp. 19-25. https://doi.org/10.1108/09685229410792934

Publisher

:

MCB UP Ltd

Copyright © 1994, MCB UP Limited

Related articles