Managers get third access security spec
โ Scribed by Helen Meyer
- Publisher
- Elsevier Science
- Year
- 1996
- Tongue
- English
- Weight
- 79 KB
- Volume
- 15
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
vendors as soon as holes are found in products, and some forward vendors' security bulletins to subscribers. CERT and FIRST have joined forces with networking andunixvendors to modify the TCP/IP protocol.They aim to close a loophole which hackers could use to overwhelm a network's security, partly by flooding it with bogus log-in requests.
๐ SIMILAR VOLUMES
As information systems move from closed environments to increasingly open environments, physical trust domains are rapidly vanishing and the demand for secure access management solutions is growing dramatically. This paper examines the trends and growth drivers in a variety of markets, and presents