๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Making the internet safe for e-commerce

โœ Scribed by Helen Meyer


Publisher
Elsevier Science
Year
1996
Tongue
English
Weight
131 KB
Volume
15
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

โœฆ Synopsis


guarded against would-be attackersAt a minimum,each time they logon, all PC users should be required to type in passwords that only they and the network administrator know These should not be easy to guess and should be changed every few weeks. The system should lock out anyone who fails to type in their correct password after three attempts. Viruses generally infect local area networks through workstations, so anti-virus software packages that work on the server alone aren't enough to prevent infection: ideally, all terminals on the network should be protected individually. Firewalls should be installed at every point where the computer system comes in contact with other networks,including the Internet,a separate local area network at a customer's site, or a telephone company switch. Even if intruders manage to break through the firewall, the data on a network should be encrypted. Microsoft Windows NT, Novell NetWare and Lotus Notes offer add-on encryption schemes that encode all data sent on the network and companies can buy standalone encryption products to work with individual applicationsAlmost all firewalls, encryption programs and password schemes include an auditing function that records network activity. The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job. This auditing log can prevent internal intrusions before they occur -if the person knows it exists. Although probably useful only to companies with ultra-high security requirements, smartcards are safer than passwords for verifying authorized users. These devices generate random numbers every minute, in sync with counterparts on each entry point in the network. This works well unless the card is stolen. PC World,


๐Ÿ“œ SIMILAR VOLUMES


An Internet-based negotiation server for
โœ Stanley Y.W. Su; Chunbo Huang; Joachim Hammer; Yihua Huang; Haifei Li; Liu Wang; ๐Ÿ“‚ Article ๐Ÿ“… 2001 ๐Ÿ› Springer-Verlag ๐ŸŒ English โš– 347 KB