Essays in the Category "Computer and Information Security"

Page 30 of 30

Computer Security: Key Management Issue

MacWEEK Special Report: Emerging Technologies

  • Bruce Schneier
  • MacWEEK
  • March 16, 1992

Back when computers stood alone on desks, unconnected to the rest of the world, computer security was simply a matter of locking an office door, putting a lock on the power supply or installing a security software package. Today, the rules of computer security are changing, and in years to come, it’s going to be a whole new ball game.

What used to be the concern solely of the military is required by more and more companies. “Between LANs, file servers and dial-up connections, it’s hard to regulate who has access to what,” said Steven Bass, principal software engineer at Codex Corp., a division of Motorola Inc. in Canton, Mass…

1 28 29 30

Sidebar photo of Bruce Schneier by Joe MacInnis.