Loading...
Please wait, while we are loading the content...
Similar Documents
Security for individual computing environments
| Content Provider | ACM Digital Library |
|---|---|
| Author | Unger, Elizabeth A. |
| Abstract | This issue of the SIGICE Bulletin has a focus of those aspects of security called secrecy and availability. Many of us, like the authors of one of the articles, asks the question, "Is security for PC's and workstations an oxymoron?" Individual Computing Environments (ICE), i.e., PC's, workstations, etc. often appear to most of us as being extremely vulnerable to a variety of secrecy and availability breaches with little one can do about the problems. What you will learn from the articles presented in this volume is that despite the vulnerability, these machines can be secured to the point of reducing the risk to a level one is willing to tolerate. The solutions suggested go beyond the commonly used virus detection and elimination software. I urge all who own or use individual computing environments on which data and programs reside to read this series of articles. |
| Starting Page | 3 |
| Ending Page | 6 |
| Page Count | 4 |
| File Format | |
| ISSN | 15581144 |
| DOI | 10.1145/181823.184667 |
| Journal | ACM SIGICE Bulletin (SICE) |
| Volume Number | 20 |
| Issue Number | 1 |
| Language | English |
| Publisher | Association for Computing Machinery (ACM) |
| Publisher Date | 1996-09-01 |
| Publisher Place | New York |
| Access Restriction | One Nation One Subscription (ONOS) |
| Content Type | Text |
| Resource Type | Article |