{"title":"安全访问关键任务应用程序","authors":"David Johnson","doi":"10.1201/1086/43304.8.1.19990301/31054.10","DOIUrl":null,"url":null,"abstract":"Abstract Every day, MIS departments in organizations around the world wonder how they can maximize the potential of the Internet. One of the biggest obstacles still holding them back is their concern over security. Organizations face new challenges when attempting to interface legacy systems with the Web. Whether it is an internal intranet or external access for employees or business partners over the Internet, a series of security measures and policies can be put in place to ensure secure access to these mission-critical applications. This article will look at several levels of security that companies should address to help alleviate concerns over utilizing the Internet for business-critical activities. Areas to address include network integrity, authentication services, communication integrity, and protection of the information flowing across the network.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Access to Mission-Critical Applications\",\"authors\":\"David Johnson\",\"doi\":\"10.1201/1086/43304.8.1.19990301/31054.10\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract Every day, MIS departments in organizations around the world wonder how they can maximize the potential of the Internet. One of the biggest obstacles still holding them back is their concern over security. Organizations face new challenges when attempting to interface legacy systems with the Web. Whether it is an internal intranet or external access for employees or business partners over the Internet, a series of security measures and policies can be put in place to ensure secure access to these mission-critical applications. This article will look at several levels of security that companies should address to help alleviate concerns over utilizing the Internet for business-critical activities. Areas to address include network integrity, authentication services, communication integrity, and protection of the information flowing across the network.\",\"PeriodicalId\":207082,\"journal\":{\"name\":\"Inf. Secur. J. A Glob. Perspect.\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1999-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Inf. Secur. J. A Glob. Perspect.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1201/1086/43304.8.1.19990301/31054.10\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/1086/43304.8.1.19990301/31054.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Abstract Every day, MIS departments in organizations around the world wonder how they can maximize the potential of the Internet. One of the biggest obstacles still holding them back is their concern over security. Organizations face new challenges when attempting to interface legacy systems with the Web. Whether it is an internal intranet or external access for employees or business partners over the Internet, a series of security measures and policies can be put in place to ensure secure access to these mission-critical applications. This article will look at several levels of security that companies should address to help alleviate concerns over utilizing the Internet for business-critical activities. Areas to address include network integrity, authentication services, communication integrity, and protection of the information flowing across the network.