tailieunhanh - Wireless Data Technologies reference phần 9

Chúng tôi đã xúc động về an ninh không dây trong suốt cuốn sách này. Trong chương này, đó là mong muốn của tôi để đi sâu hơn vào chủ đề của an ninh thông tin nói chung cũng như tác động của nó trên các công nghệ không dây. | 11 Wireless Information Security W-INFOSEC We have touched on Wireless Security throughout this book. In this chapter it is my desire to go deeper into the subject of Information Security in general as well as its impact on Wireless Technologies. Introduction In this day and age almost every major newspaper or network news broadcast and in every Information Technology-oriented news bulletin and magazine there are headlines about computer security break-ins and system vulnerabilities. These are providing the drive behind launching information security or InfoSec as it is most often referred to programs. Times have changed and Information Security programs now need to confront much more than basic security subjects. Many experts believe that it is important to develop a security program within the context of the company s business objectives and culture in order to better understand where the risk comes from and why. Therefore an InfoSec program needs to uncover and respond to the business risks present in the organization. This process begins by critically assessing aspects of the practices and procedures from the standpoint of security. This can reveal unalterable aspects of the corporate culture initiatives with a higher priority than security staff and operational limitations retention and recruitment difficulties budget constraints etc. Since its inception Information Security has been somewhat of a dark horse in Computer Science. The past few decades have seen a global drive to realizing Wireless Data Technologies. Vern A. Dubendorf 2003 John Wiley Sons Ltd ISBN 0-470-84949-5 188 WIRELESS INFORMATION SECURITY W-INFOSEC the potential of the information revolution in a desire to make a positive change on the world. Now that we are deep inside the information age we are now faced with addressing the negative manifestations of these advancements in an environment that was designed to be open - not protected. As has often occurred in the past attention to .

TỪ KHÓA LIÊN QUAN