Search Details

Word: access (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

Santis speaks of similar problems: as technology increasingly centralizes operating procedures but diversifies access "you're getting a potentially dangerous change in areas like separation of duties," he says. "Whereas before you'd have one guy who'd write the check now they're being done by the same data operator." It is from inside and costs the company $500,000 whereas average white-collar crimes are for $20,000," Santis says...

Author: By Robert M. Neer, | Title: Data of Tap | 11/15/1984 | See Source »

While technological advances are increasing the necessity for uninterrupted computing services, they are at the same time making that guarantee more difficult to assure. A moment's reflection on the Sloan-Kettering case described above shows why; whereas ten years ago access to computers was limited in most cases to users who could get into a terminal room, today anyone with an inexpensive personal (or "micro") computer and a modem (a device that allows computers to communicate over telephone lines) can access the majority of computers in the United States. [Its computer security] becoming more and more critical because...

Author: By Robert M. Neer, | Title: Data of Tap | 11/15/1984 | See Source »

...first there seems to be an obvious solution--why not "seal" computers from any outside access, as the Defense Department does with the most sensitive of its nuclear early warning systems? The idea is uniformly rejected by both computer users and security professionals who argue that so-called dedicated systems lose the flexibility and ease of communication that are precisely the most attractive qualities of computers. "It's not so simple as it was a few years ago. You can't just lock up a computer anymore," says Hewlett-Packard's Gerard. An internal letter on computer security distributed...

Author: By Robert M. Neer, | Title: Data of Tap | 11/15/1984 | See Source »

...most computers "when you think about what you've got to protection can come in bewildering variety. Computer security begins with the operating' system, the master program that controls access to the computer itself. It is here that hardware companies become involved since operating systems are in general designed by the manufacturer. "If you don't have a good security design in your operating system security within the applications can't be well maintained," says Ashton. Nonetheless, security per se is not generally acknowledged to be the responsibility of the manufacturer. "It's not General Motors' responsibility to enforce...

Author: By Robert M. Neer, | Title: Data of Tap | 11/15/1984 | See Source »

distribution of certain kinds of research and access to facilities under the Export Administration...

Author: By Laura E. Gomez, | Title: Report Lists, Criticizes Gov. Research Restrictions | 11/8/1984 | See Source »

Previous | 184 | 185 | 186 | 187 | 188 | 189 | 190 | 191 | 192 | 193 | 194 | 195 | 196 | 197 | 198 | 199 | 200 | 201 | 202 | 203 | 204 | Next