![]() |
![]() |
![]() |
IN THIS ISSUE:
>
Word of the Day: deperimeterization
>
Today's Tech News
>
Brain Food
>
Additions and Updates
![Today's Word]()
![]()
deperimeterization
In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication. Today, network administrators commonly use a castle analogy to
explain their security strategy. Network devices are placed behind a firewall and security efforts are focused on keeping intruders out. With the advent of Web services and a mobile work force, however, some administrators are beginning to question whether the traditional border model of IT
security is practical.
The term deperimeterization was coined by Paul Simmonds of the Jericho Forum, a non-profit group dedicated to "the development of open standards to enable secure, boundaryless information flows across organizations." Simmonds says that a hardened perimeter security strategy is impossible to sustain and is fundamentally at odds with an agile business model. He points out that currently it can take from one to six months to set up a new sales office. A network administrator might have to design an
extension to the corporate wide area network (WAN), negotiate a contract with a telecom and Internet service provider (ISP), install a local area network (LAN), set-up a virtual private
network (VPN), and install telephones and desktop PCs to get the office up and running. In the proposed deperimeterization model, however, the administrator would simply need to connect desktop PCs and VoIP telephones to the Internet, because all points of the company's network, from front-end
gateways to back-end components, would be secure. For such a strategy to work, all data on the company's network would need to be encrypted and end-users, whether they were internal staff, customers, or business partners, would be given as-needed authorization to access specific pieces of encrypted data within the company's network.
MORE INFO:
> The Jericho Forum provides more information.
> On Blackhat.com, ICI's Paul Simmonds provides a presentation about "De-Perimeterization."
![]()
![Today's Tech News]()
![]()
Oracle patches now on quarter system
[SearchSecurity.com]
Oracle's chief security officer said a quarterly patching schedule is the company's attempt to offer customers a happy medium.
You're slipping: Warning signs for security managers
[SearchSecurity.com]
Six signs that you're losing your grip as a security leader.
Virtual tape libraries: Buyers beware
[SearchStorage.com]
Missing tapes, or tapes that don't fit anywhere, are just some of the unwanted surprises users can face when recovering data from a virtual tape library.
More Tech News
Catch up on all the latest IT news!
![Brain Food]()
![]()
Secret Word of the Day
This element, present in sand and glass, resembles aluminum in its pure state. What is it?
Answer
Today's Trivia Question
What shape is a lemniscate, the symbol for infinity?
Answer
IT Alphabet Soup
Mtops is a measure of computer performance used by the U.S. government to determine whether a computer can be exported to certain countries. What does Mtops stand for?
a. millions of technical operations per second
b. million theoretical operations per second
c. modulated technical operations per second
Answer
Learning Center Update: A primer on Exchange public folders
Learn how to make the most of public folders -- from setting permissions and storage limits to customizing, recovering and troubleshooting public folder content.
![Additions and Updates]()
![]()
Do you use Google? You can find our definitions quickly on Google by
just entering: Whatis.com name-of-term. For example, go to Google and
enter "Whatis.com bit stuffing" (without the quotes) and you'll find
a link to our definition for "bit stuffing."
(Hint: Go to Google
right now and try it.)
serial-attached SCSI
smart antenna
SISO
AutoRun
Quiz: Memory
|
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
|
![]() |
|
![]() |
|