Risks and threats from Internet access: protecting the institution

Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association of Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. Telnek When telnet is used to access a computer at another location, its threats are similar to those describd under FTP below. But when others are allowed to telnet into the institution’s computer, then some protection is necessary to insure that users are authorized and cannot perform destructive actions. The solution to this is a hardware/software “firewall” and the details of establishing such protections are beyond the scope of this paper.