Typically, network security has tended to focus on building impenetrable outer walls. However, this article discusses a new threat that lifestyle computing devices such as iPods, PDAs, and small USB pen drives (which can now hold up to 60 Gbytes of data) can pose to corporations, and the need for IT managers to protect other corporate vulnerabilities: namely, PC ports. The author outlines various methods managers can use to protect company data, including setting up permission rules and enforcing acceptable use policies (AUPs).
- Source: The Great Wall Syndrome, Thelander, M., DOI: 10.1109/MITP.2005.126, IT Professional, IEEE, Sept.-Oct. 2005, online 2005/10/10
- Contributed by Atin Das - dasatinyahoo.co.in