๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

De-perimeterisation: inevitable and essential

โœ Scribed by Alastair Broom


Publisher
Elsevier Science
Year
2009
Tongue
English
Weight
167 KB
Volume
2009
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

โœฆ Synopsis


Network Security 7 less susceptible to these forms of attack. However, even if these changes were made today, the majority of systems in the wild would not be running them for some time. It may be a decade or more before key systems running on corporate networks have been migrated away from operating systems that employ vulnerable password database systems. The opportunities for password theft at high speed will remain worryingly prevalent.

De-perimeterisation: inevitable and essential

Alastair Broom, UK security line of business director, Dimension Data My business's employees are mobile, our applications are highly interconnected and we use ecommerce platforms, extranets and the web to communicate with suppliers, partners, and customers. So where is the perimeter of my network?

And how do I protect it if I cannot define it?

In 2003, a group of CISOs from global corporations such as BP and ICI set out to answer these questions and in January 2004 they formed the Jericho Forum. Their aim was to determine the best way to enable secure ebusiness in a world without boundaries where the internet is king. They concluded that hard perimeters separating 'secure' corporate networks from 'insecure' public networks, inside from outside, and trusted from untrusted were not conducive to this new way of doing business. So they coined the term 'de-perimeterisation' to reflect a fundamental shift in the way the corporate network in general and network security in particular should be conceptualised, designed, constructed, and managed. With deperimeterisation, the corporate network and the internet are synonymous and the focus for security moves from the network to the data.


๐Ÿ“œ SIMILAR VOLUMES


De-Perimeterisation: Benefits and limita
โœ Graham Palmer ๐Ÿ“‚ Article ๐Ÿ“… 2005 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 420 KB

De-Perimeterisation is a new term to describe phenomena becoming common in modern ICT environments. It refers to the erosion of the hard-shell model used to describe the structure of traditional information security implementations while capturing the growing requirement for perimeters to be breache

The essential oil of Sphaeranthus suaveo
โœ H. L. De Pooter; L. F. De Buyck; N. M. Schamp; F. M. Harraz; I. M. El-Shami ๐Ÿ“‚ Article ๐Ÿ“… 1991 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 203 KB ๐Ÿ‘ 1 views

In the essential oil of Sphaeranthus suaveolens DC, prepared by hydro-distillation of the dried leaves, 34 compounds were identified by GC and GC-MS. The oil is marked by a high content of a-pinene (10.6%), isopinocamphone (33.5 %) and thymohydroquinone dimethylether (1,4-dimethoxy-2-methyl-5-( 1-me