ABSTRACT

Today’s portable computing environment can take on a

variety of forms: from remote connectivity to the home

office to remote computing on a standalone microcomputer

with desktop capabilities and storage. Both of these portable

computing methods have environment-specific threats as

well as common threats that require specific protective mea-

sures. Remote connectivity can be as simple as standard dial-

up access to a host mainframe or as sophisticated as remote

node connectivity in which the remote user has all the func-

tions of a workstation locally connected to the organization’s

local area network (LAN). Remote computing in a standa-

lone mode also presents very specific security concerns,

often not realized by most remote computing users.