ABSTRACT
Today’s portable computing environment can take on a
variety of forms: from remote connectivity to the home
office to remote computing on a standalone microcomputer
with desktop capabilities and storage. Both of these portable
computing methods have environment-specific threats as
well as common threats that require specific protective mea-
sures. Remote connectivity can be as simple as standard dial-
up access to a host mainframe or as sophisticated as remote
node connectivity in which the remote user has all the func-
tions of a workstation locally connected to the organization’s
local area network (LAN). Remote computing in a standa-
lone mode also presents very specific security concerns,
often not realized by most remote computing users.