Dial-up Security Controls

نویسنده

  • Alan Berman
چکیده

PROBLEM ADDRESSED In a period of less than 5 years, the ability to access information using dial-up telephone lines and modems has grown to an extraordinary level. What began as restricted access to a single computer system has grown into the ability to explore millions of computers. With the ease of access has come the ongoing dilemma of how to maintain ease of access for those who have it and, at the same time, restrict access for those who should not have right of entry. Even with the growth of new forms of security, the predominant means of gaining access is still the user ID and password. As this security means proves less than adequate, other access control methods should be considered.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Decentralised Access Control in 802.11 Networks

The current WiFi access control framework descends from solutions conceived in the past for dial-up scenarios. A key difference between the two worlds is mobility: dial-up handles nomadic users, while modern wireless networks support continuous mobility through always-on personal devices. Not surprisingly, WiFi authentication does not exploit mobility in any way; on the contrary, mobility is pe...

متن کامل

Protecting against Dial-in Hazards: E-mail and Data Communications

PROBLEMS ADDRESSED With the advent of nomadic and home office environments, remote access security is once again taking its place at the forefront of security planning activities. Everyone wants an Internet presence and Internet access. Telecommuting is gaining in popularity. Sales agents armed with laptops roam the countryside. Opening up systems to casual access by nomadic and home office wor...

متن کامل

Using an Intranet for Physician Desk Top Data Consolidation

Kaleida Health developed one of the first web-based information delivery systems specific to patient care. Through an Intranet or secure dial-up connection, registered practitioners and staff access patient demographics, laboratory data, radiology results, and dictated reports. Additionally, standard forms, patient educational material, and other management information are available. The develo...

متن کامل

PPP and WLAN May

Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...

متن کامل

Authentication, Authorization, and Accounting (AAA) Registration Keys for Mobile IPv4

Authentication, Authorization, and Accounting (AAA) servers, such as RADIUS and DIAMETER, are in use within the Internet today to provide authentication and authorization services for dial-up computers. Mobile IP for IPv4 requires strong authentication between the mobile node and its home agent. When the mobile node shares an AAA Security Association with its home AAA server, however, it is pos...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999