{"title":"Micro-Mainframe Security","authors":"Angel L. Rivera","doi":"10.1080/19393559208551315","DOIUrl":null,"url":null,"abstract":"The widespread use and availability of microcomputers and local area networks (LANs) has drastically changed the way in which users do computing and access mainframes. Communications technology and LANs have increased the capability to interconnect computers remotely and locally. Users are demanding access to mainframe data bases, whether it be through dial-up lines, gateways, or 3270/coaxial connections. Unfortunately, many organizations are still focusing solely on physically and logically protecting the mainframe and its applications, which may not be sufficient to ensure the security of information on these systems. Statistics concerning computer crime indicate that most computer crime is committed by insiders, which implies that these criminals already have some form of access to the mainframe. Because it is common for log-on, user identification, and other data for these mainframes to travel over communications lines in cleartext, anyone with access to a microcomputer connected to the mainframe can ...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/19393559208551315","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The widespread use and availability of microcomputers and local area networks (LANs) has drastically changed the way in which users do computing and access mainframes. Communications technology and LANs have increased the capability to interconnect computers remotely and locally. Users are demanding access to mainframe data bases, whether it be through dial-up lines, gateways, or 3270/coaxial connections. Unfortunately, many organizations are still focusing solely on physically and logically protecting the mainframe and its applications, which may not be sufficient to ensure the security of information on these systems. Statistics concerning computer crime indicate that most computer crime is committed by insiders, which implies that these criminals already have some form of access to the mainframe. Because it is common for log-on, user identification, and other data for these mainframes to travel over communications lines in cleartext, anyone with access to a microcomputer connected to the mainframe can ...