Shall we hook up the old stuff?

Main Article Content

Andreas Dannert

Keywords

Telecommunications, Legacy Systems,

Abstract

Computer systems, technologies and applications that do not meet current standards, known as legacy systems, are increasingly connected to the Internet for various reasons. Connecting them to an environment they were never intended for can potentially have serious operational security risk implications. This article discusses some of the reasons.
Abstract 337 | PDF Downloads 0

References

German Institute for Standardisation (DIN), (2015), Accessed 1 December 2015 at http://www.din.de/en

Jackson, K., (2015), “Microsoft Windows 10: Three Security Features To Know About”, Dark Reading, 1 June 2015, Accessed on 1 December 2015 at http://www.darkreading.com/cloud/microsoft-windows-10-three-security-features-to-know-about/d/d-id/1320650

National Electrical Installation Standards (NEIS), (2015), Accessed 1 December 2015 at http://www.neca-neis.org/

Standards Australia, (2015), Accessed 1 December 2015 at http://www.standards.org.au

Wells, R., (1994), “Government Data on Corporations Now Available on Internet: Information: Experimental linkup with the SEC's 'Edgar' database increases public access, but critics say it could impede wider marketing efforts”, La Times, 19 July 1994, Accessed on 1 December 2015 at http://articles.latimes.com/1994-07-19/business/fi-17364_1_public-access

Whittaker, Z., (2015), “A 23-year-old Windows 3.1 system failure crashed Paris airport”, ZDNet, 16 November 2015, Accessed online 1 December 2016 at http://www.zdnet.com/article/a-23-year-old-windows-3-1-system-failure-crashed-paris-airport/

Wikipedia, (2015a), “Legacy System”, Accessed 1 December 2015 at https://en.wikipedia.org/wiki/Legacy_system

Wikipedia, (2015b), “Denial-of-service attack”, Accessed on 1 December 2015 at https://en.wikipedia.org/wiki/Denial-of-service_attack