We can hide and store information, but how do we actually use it? This chapter talks about tools for remotely connecting to and/or managing information sources and services in a secure manner. Secure storage is great, but what happens when you need to access that data, or move it from one machine to another? How do you do this securely?
- The ability to access information from anywhere is one of the most powerful benefits of network computing, but the lack of universal standards for computing makes it hard to capitalize on the opportunity.
- Different operating system and networking architectures support different approaches to accessing information. Visually focused operating systems such as Windows and MacOS emphasize usability over flexibility. More complex systems like Linux use a textual interface for efficiency.
- It’s important to match the right method of accessing information to a particular task. Some tasks are best accomplished within a visual environment (creative design) while others benefit from the flexibility of a textual interface (servers). A mismatch can lead to security problems.
These chapters describe the major technologies for data access across networks:
The above information is an excerpt from "Network Security Illustrated," published by McGraw-Hill and available from amazon.com, as well as your local bookstore. The book goes into much greater depth on this topic. To learn more about the book and what it covers, click here.
Below, you'll find links to online resources that supplement this portion of the book.