{"title":"安全使用个人工作站和局域网","authors":"Leslie D. Ball","doi":"10.1145/800173.809687","DOIUrl":null,"url":null,"abstract":"This panel is charged with presenting solutions to problems associated with securing the personal workstation and local area networks. My function is to set the stage for the presentations which will follow by defining technology changes that are occurring and suggesting security issues that evolve from these changes. My job, then, is to raise the problems while my esteemed associates will present the solutions.\n Changes are occurring both in the technology that we are using and in the manner in which businesses are managed. At least nine major technology changes impact office systems. First, there is a move which seems to grow daily towards distributed data processing. A partial cause of this movement is the increased availability of small computers and management's desire to have their processing power closer to the information users.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure use of personal workstations and local area networks\",\"authors\":\"Leslie D. Ball\",\"doi\":\"10.1145/800173.809687\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This panel is charged with presenting solutions to problems associated with securing the personal workstation and local area networks. My function is to set the stage for the presentations which will follow by defining technology changes that are occurring and suggesting security issues that evolve from these changes. My job, then, is to raise the problems while my esteemed associates will present the solutions.\\n Changes are occurring both in the technology that we are using and in the manner in which businesses are managed. At least nine major technology changes impact office systems. First, there is a move which seems to grow daily towards distributed data processing. A partial cause of this movement is the increased availability of small computers and management's desire to have their processing power closer to the information users.\",\"PeriodicalId\":306306,\"journal\":{\"name\":\"ACM '83\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM '83\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/800173.809687\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM '83","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800173.809687","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure use of personal workstations and local area networks
This panel is charged with presenting solutions to problems associated with securing the personal workstation and local area networks. My function is to set the stage for the presentations which will follow by defining technology changes that are occurring and suggesting security issues that evolve from these changes. My job, then, is to raise the problems while my esteemed associates will present the solutions.
Changes are occurring both in the technology that we are using and in the manner in which businesses are managed. At least nine major technology changes impact office systems. First, there is a move which seems to grow daily towards distributed data processing. A partial cause of this movement is the increased availability of small computers and management's desire to have their processing power closer to the information users.