22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.1 Introduction<br />

4 Lotus Security Handbook<br />

The business world as we know it has evolved rapidly over the years and through<br />

this evolution, so has the way companies do business. As we find ourselves in<br />

this new era, it is thanks to a number of important revolutions that occurred in the<br />

previous two decades.<br />

The first revolution occurred in the early 1980s with the advent of the <strong>IBM</strong><br />

Personal Computer, which was the first true business microcomputer on the<br />

market. It permitted companies and individuals alike to have access to computing<br />

resources which were relatively inexpensive for their times. Connecting these<br />

machines through a local network enabled the flow of information like never<br />

before and brought forth the notion of distributed computing. This lead to an<br />

explosion of business solutions that changed significantly the way businesses<br />

operated.<br />

The second revolution occurred in the mid 1990s, with the marriage of what was<br />

then a twenty year old collection of networks (called the Internet, originally<br />

named ARPANet) with the Web browser. This marriage made it finally easy to<br />

access information on the Internet. This was the genesis of e-Business. With the<br />

help of Web servers and a standard set of Web technologies, organizations<br />

could now offer a plethora of services and goods over the Internet. These same<br />

organizations found also that they could better communicate and exchange<br />

information with their suppliers. As well, by carefully opening up their internal<br />

networks to the Internet, these organizations could permit employees to access<br />

data and electronic mail from their personal homes, or, even more importantly,<br />

from anywhere in the world their employees happened to be, whether at remote<br />

locations or while on the road.<br />

1.1.1 Knowledge capital<br />

In this new age of e-Business, information has become an important commodity.<br />

It is correctly referred to as knowledge capital, which is a form of capital many<br />

businesses depend on the same way they do on their monetary capital. As a<br />

matter of fact, businesses live and die by the measure of control they have over<br />

their knowledge capital. If this capital is stolen, disclosed, corrupted, or<br />

destroyed, a company can suffer greatly—even to the point of losing its<br />

existence.<br />

There are individuals who make it their purpose in life to get unauthorized access<br />

to computer networks, systems, and the information they store and disseminate.<br />

In the more benign form, these individuals do it for the sheer thrill of it, to boast of<br />

their mastery of computer sciences and nothing more (they are usually referred<br />

to as white hat hackers). In worse forms, these individuals do it for malicious

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!