Computer Parts
Date Submitted: 07/01/2004 18:20:34
The world of computers has changed dramatically over the past 25 years. Twenty-five years ago, most computers were centralized and managed in data centers. Computers were kept in locked rooms and links outside a site were unusual. Computer security threats were rare, and were basically concerned with insiders. These threats were well understood and dealt with using standard techniques: computers behind locked doors and accounting for all resources. Twenty-five years later, many systems are connected to
Is this Essay helpful? Join now to read this particular paper
and access over 480,000 just like this GET BETTER GRADES
and access over 480,000 just like this GET BETTER GRADES
computer users on the network are growing rapidly. And the number of wide area network services employed by the company to reach its network users is also expanding.
In this typical 3Com Security solution, secure tunneling ensures that proper security levels are maintained from wireless LANs and connections made over the public Internet. With 3Com's firewall and encryption protection prevents external intrusion while giving remote offices, telecommuters and mobile users full access to corporate resources.
Need a custom written paper? Let our professional writers save your time.