Shall we hook up the old stuff?
Main Article Content
Keywords
Telecommunications, Legacy Systems,
Abstract
Computer systems, technologies and applications that do not meet current standards, known as legacy systems, are increasingly connected to the Internet for various reasons. Connecting them to an environment they were never intended for can potentially have serious operational security risk implications. This article discusses some of the reasons.
Downloads
Download data is not yet available.
References
German Institute for Standardisation (DIN), (2015), Accessed 1 December 2015 at http://www.din.de/en
Jackson, K., (2015), “Microsoft Windows 10: Three Security Features To Know About”, Dark Reading, 1 June 2015, Accessed on 1 December 2015 at http://www.darkreading.com/cloud/microsoft-windows-10-three-security-features-to-know-about/d/d-id/1320650
National Electrical Installation Standards (NEIS), (2015), Accessed 1 December 2015 at http://www.neca-neis.org/
Standards Australia, (2015), Accessed 1 December 2015 at http://www.standards.org.au
Wells, R., (1994), “Government Data on Corporations Now Available on Internet: Information: Experimental linkup with the SEC's 'Edgar' database increases public access, but critics say it could impede wider marketing efforts”, La Times, 19 July 1994, Accessed on 1 December 2015 at http://articles.latimes.com/1994-07-19/business/fi-17364_1_public-access
Whittaker, Z., (2015), “A 23-year-old Windows 3.1 system failure crashed Paris airport”, ZDNet, 16 November 2015, Accessed online 1 December 2016 at http://www.zdnet.com/article/a-23-year-old-windows-3-1-system-failure-crashed-paris-airport/
Wikipedia, (2015a), “Legacy System”, Accessed 1 December 2015 at https://en.wikipedia.org/wiki/Legacy_system
Wikipedia, (2015b), “Denial-of-service attack”, Accessed on 1 December 2015 at https://en.wikipedia.org/wiki/Denial-of-service_attack
Jackson, K., (2015), “Microsoft Windows 10: Three Security Features To Know About”, Dark Reading, 1 June 2015, Accessed on 1 December 2015 at http://www.darkreading.com/cloud/microsoft-windows-10-three-security-features-to-know-about/d/d-id/1320650
National Electrical Installation Standards (NEIS), (2015), Accessed 1 December 2015 at http://www.neca-neis.org/
Standards Australia, (2015), Accessed 1 December 2015 at http://www.standards.org.au
Wells, R., (1994), “Government Data on Corporations Now Available on Internet: Information: Experimental linkup with the SEC's 'Edgar' database increases public access, but critics say it could impede wider marketing efforts”, La Times, 19 July 1994, Accessed on 1 December 2015 at http://articles.latimes.com/1994-07-19/business/fi-17364_1_public-access
Whittaker, Z., (2015), “A 23-year-old Windows 3.1 system failure crashed Paris airport”, ZDNet, 16 November 2015, Accessed online 1 December 2016 at http://www.zdnet.com/article/a-23-year-old-windows-3-1-system-failure-crashed-paris-airport/
Wikipedia, (2015a), “Legacy System”, Accessed 1 December 2015 at https://en.wikipedia.org/wiki/Legacy_system
Wikipedia, (2015b), “Denial-of-service attack”, Accessed on 1 December 2015 at https://en.wikipedia.org/wiki/Denial-of-service_attack