Shall we hook up the old stuff?

Main Article Content

Andreas Dannert


Telecommunications, Legacy Systems,


Computer systems, technologies and applications that do not meet current standards, known as legacy systems, are increasingly connected to the Internet for various reasons. Connecting them to an environment they were never intended for can potentially have serious operational security risk implications. This article discusses some of the reasons.
Abstract 337 | PDF Downloads 0


German Institute for Standardisation (DIN), (2015), Accessed 1 December 2015 at

Jackson, K., (2015), “Microsoft Windows 10: Three Security Features To Know About”, Dark Reading, 1 June 2015, Accessed on 1 December 2015 at

National Electrical Installation Standards (NEIS), (2015), Accessed 1 December 2015 at

Standards Australia, (2015), Accessed 1 December 2015 at

Wells, R., (1994), “Government Data on Corporations Now Available on Internet: Information: Experimental linkup with the SEC's 'Edgar' database increases public access, but critics say it could impede wider marketing efforts”, La Times, 19 July 1994, Accessed on 1 December 2015 at

Whittaker, Z., (2015), “A 23-year-old Windows 3.1 system failure crashed Paris airport”, ZDNet, 16 November 2015, Accessed online 1 December 2016 at

Wikipedia, (2015a), “Legacy System”, Accessed 1 December 2015 at

Wikipedia, (2015b), “Denial-of-service attack”, Accessed on 1 December 2015 at