{"title":"重视传真安全","authors":"Harry B. DeMaio","doi":"10.1080/19393559308551347","DOIUrl":null,"url":null,"abstract":"It's not uncommon when security specialists get together for someone to conduct an impromptu poll on such burning issues as single sign-on, client/server security, multiplatform security, data sharing, dial-up security, and downsizing. If the concerns of my security consulting clients are any indicator, these issues certainly belong there. Important as these topics are, however, I want to raise a subject that seldom makes that list but should: the physical and procedural security of fax devices. The issue of fax security isn't difficult to understand or to explain to others. The problem can be presented to business executives with ample justification for concern—and real solutions that require a relatively small investment can be proposed. All in all, it's an attractive combination of problem and solution that doesn't come around often in the field of information security.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Taking Fax Security Seriously\",\"authors\":\"Harry B. DeMaio\",\"doi\":\"10.1080/19393559308551347\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It's not uncommon when security specialists get together for someone to conduct an impromptu poll on such burning issues as single sign-on, client/server security, multiplatform security, data sharing, dial-up security, and downsizing. If the concerns of my security consulting clients are any indicator, these issues certainly belong there. Important as these topics are, however, I want to raise a subject that seldom makes that list but should: the physical and procedural security of fax devices. The issue of fax security isn't difficult to understand or to explain to others. The problem can be presented to business executives with ample justification for concern—and real solutions that require a relatively small investment can be proposed. All in all, it's an attractive combination of problem and solution that doesn't come around often in the field of information security.\",\"PeriodicalId\":207082,\"journal\":{\"name\":\"Inf. Secur. J. A Glob. Perspect.\",\"volume\":\"84 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Inf. Secur. J. A Glob. Perspect.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/19393559308551347\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/19393559308551347","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
It's not uncommon when security specialists get together for someone to conduct an impromptu poll on such burning issues as single sign-on, client/server security, multiplatform security, data sharing, dial-up security, and downsizing. If the concerns of my security consulting clients are any indicator, these issues certainly belong there. Important as these topics are, however, I want to raise a subject that seldom makes that list but should: the physical and procedural security of fax devices. The issue of fax security isn't difficult to understand or to explain to others. The problem can be presented to business executives with ample justification for concern—and real solutions that require a relatively small investment can be proposed. All in all, it's an attractive combination of problem and solution that doesn't come around often in the field of information security.