IT Employment

General discussion

Locked

IT Debate: Security Vulnerabilities of B

By itdebate ·
Users are increasingly clamoring to use xDSL and cable modems to remotely access corporate systems. But network managers must understand the security risks in these technologies before supporting broadband remote access. What are you doing to secureyour transmissions? Do you prefer xDSL or cable modem services? Who do you think will win the technology security war: the hackers or the network administrators? You can read the related Gartner article, which will be posted on 3 A.M. Wednesday, athttp://www.techrepublic.com/article.jhtml?id=r00620000712ggp01.htm.

This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Comments

Collapse -

IT Debate: Security Vulnerabilities of B

by BrokenEagle In reply to IT Debate: Security Vulne ...

The issue is not IF you should do it, but HOW you should do it. Once enough senior people in your organization have DSL or cable modems at home, there will be no way you can stop their use. That is why the issue is realy how to implement high speed access with a minimal amount of risk.

Collapse -

IT Debate: Security Vulnerabilities of B

by itdebate In reply to IT Debate: Security Vulne ...
Collapse -

IT Debate: Security Vulnerabilities of B

by mwb In reply to IT Debate: Security Vulne ...

I propose that there is no security "war" being waged at all. Most security breaches are not deliberate attempts of malicious malcontents to bring an enemy to its knees or cases of corporate espionage. With the possible exception of credit card fraud most hacking or cracking attempts are done simply because they can be...they are an exciting alternative to watching TV or going to work. Add to that most of these crimes are viewed as victimless by the hacker and you have a societal class simply seeking a high-risk, challenging pastime - no different from rock climbing. What they don't realize is that there really is no challenge at all. Human error is inevitable and it shows in the holes they discover. Until networks can configure themselves, holes will always be present. Besides, do you want one side to win? They seem to promote each other by increasing administrative job security and at the same time giving the socially challenged something to do!

Collapse -

IT Debate: Security Vulnerabilities of B

by itdebate In reply to IT Debate: Security Vulne ...

Your answer was featured in our IT Debate TechMail. To receive your free subscription to the IT Debate TechMail, sign up at http://www.techrepublic.com/techmails.jhtml

Related Discussions

Related Forums