Abstract
An autonomous computer, with no external communications links and with all its terminals and peripherals housed within a secure, screened computer room, is vulnerable only to the entry of unauthorised users and users gaining access to information which they are not authorised to receive. These security risks may be reduced by an efficient means of user identification and control on access to the computer room, plus a system of access controls for information within the computer. These aspects are outside the main theme of this chapter because they are computer and physical security issues. This chapter is concerned with security threats which arise when the computer is connected to external terminals or peripherals and to communications networks which provide remote access or file transfers with other computers. Computer and communications security are considered in greater detail in reference 11.1.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 1988 J R Freer
About this chapter
Cite this chapter
Freer, J.R. (1988). Threats to communications security. In: Computer Communications and Networks. Computer Communications and Networks. Springer, Boston, MA. https://doi.org/10.1007/978-1-4613-1041-9_11
Download citation
DOI: https://doi.org/10.1007/978-1-4613-1041-9_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4612-8305-8
Online ISBN: 978-1-4613-1041-9
eBook Packages: Springer Book Archive