First page Back Continue Last page Overview Graphics
Sharing: access controls as used in single machine systems (ACLs, user authentication, etc.) may not be suitable for networked environments.
Complexity of system: Adding network abilities to an already complicated operating system can only make things more difficult to secure.
Unknown Perimeter: Wireless networks and other dynamic environments defy being defined and thus difficult to control.