Table of contents
Erratum
This article has been withdrawn as it was published elsewhere and accidentally duplicated. The original article can be seen here: 10.1108/02634509310051533. When citing the…
To Serve and Protect: : Reconciling Information Protection with LAN Environments
Kenneth P. WeissThere is a hierarchically related set of fundamental securitytechnologies that have been used (sometimes without need for thehierarchy) in the late 1970s and 80s to protect…
Minimizing Risk in Your Wide Area Network Design
Graham P. Bell, David KavanaghIf you understand the fundamental objectives of your organization andhow your telecommunication network assists you to achieve theseobjectives you will have a sound basis for the…
The Data Network Disaster Recovery Plan: : Considerations and Concerns
Stewart WhiteFirst, know your network, its key points, the geographic nature of thebusiness and how disaster can happen. Second, understand where thenetwork bottlenecks are positioned. Several…
Developing a Successful Network Disaster Recovery Plan
Bruce EdwardsConcentrates on the preparation for and the procedures to be followed increating a disaster recovery plan. The recovery strategy, recoveryteams, procedures and action tests, and…
New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade
Kenneth P. WeissArgues that the Clipper chip is an expensive, flawed technology which isbeing aggressively proposed by the US administration and may permanentlyerode personal privacy without…
EDI Security Issues Can Be Overcome
David HainsTechnical problems of standardizing on adequate measures for security,integrity and authentication constitute a major reason why EDI has beenslow to catch on. Describes the…