Wireless security policies
โ Scribed by Bruce Potter
- Publisher
- Elsevier Science
- Year
- 2003
- Tongue
- English
- Weight
- 258 KB
- Volume
- 2003
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
not the disease. Shipping operating systems with unnecessary services enabled is irresponsible and risky at best. What role does RPC/DCOM play on the average home user's computer? In the case of WebDAV, why enable remote management tools by default? Hasn't history taught us this same lesson over and again?
End users cannot be required nor expected to harden their computer systems. Its purely a pipe dream to ever assume they can or will. The burden cannot simply be off-loaded to the ISP either. Change must come from the source and it must come in the form of more responsible software releases. Only those services absolutely necessary for the system to operate in a non-networked fashion should be enabled by default. To do otherwise continues to place users and the Internet at increased risk of attack.
๐ SIMILAR VOLUMES
Often, the focus when discussing wireless security is on new technology. Our natural instinct is to look for technological solutions to security problems; better firewalls to keep out advanced attackers, better intrusion detection systems to find advanced attacks on the network, and better wireless
Various healthcare areas such as diagnosis, surgery, intensive care and treatment, and patient monitoring in general, would greatly benefit from light, autonomous devices which can be unobtrusively mounted on the patient's body in order to monitor and report health-relevant variables to an interconn