Title: Word of the Day
November 19, 2004 Published by  WhatIs.com

Word of the Day

WhatIs.com
LOOK IT UP     LEARNING CENTER     FAST REFERENCES     CAREERS        
IN THIS ISSUE:
  >  Word of the Day: deperimeterization
  >  Today's Tech News
  >  Brain Food
  >  Additions and Updates

Today's Word

deperimeterization
In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication. Today, network administrators commonly use a castle analogy to explain their security strategy. Network devices are placed behind a firewall and security efforts are focused on keeping intruders out. With the advent of Web services and a mobile work force, however, some administrators are beginning to question whether the traditional border model of IT security is practical.

The term deperimeterization was coined by Paul Simmonds of the Jericho Forum, a non-profit group dedicated to "the development of open standards to enable secure, boundaryless information flows across organizations." Simmonds says that a hardened perimeter security strategy is impossible to sustain and is fundamentally at odds with an agile business model. He points out that currently it can take from one to six months to set up a new sales office. A network administrator might have to design an extension to the corporate wide area network (WAN), negotiate a contract with a telecom and Internet service provider (ISP), install a local area network (LAN), set-up a virtual private network (VPN), and install telephones and desktop PCs to get the office up and running. In the proposed deperimeterization model, however, the administrator would simply need to connect desktop PCs and VoIP telephones to the Internet, because all points of the company's network, from front-end gateways to back-end components, would be secure. For such a strategy to work, all data on the company's network would need to be encrypted and end-users, whether they were internal staff, customers, or business partners, would be given as-needed authorization to access specific pieces of encrypted data within the company's network.

MORE INFO:
The Jericho Forum provides more information.
On Blackhat.com, ICI's Paul Simmonds provides a presentation about "De-Perimeterization."



Today's Tech News

Oracle patches now on quarter system
[SearchSecurity.com]
Oracle's chief security officer said a quarterly patching schedule is the company's attempt to offer customers a happy medium.

You're slipping: Warning signs for security managers
[SearchSecurity.com]
Six signs that you're losing your grip as a security leader.

Virtual tape libraries: Buyers beware
[SearchStorage.com]
Missing tapes, or tapes that don't fit anywhere, are just some of the unwanted surprises users can face when recovering data from a virtual tape library.

More Tech News
Catch up on all the latest IT news!


Brain Food

Secret Word of the Day
This element, present in sand and glass, resembles aluminum in its pure state. What is it?
Answer

Today's Trivia Question
What shape is a lemniscate, the symbol for infinity?
Answer

IT Alphabet Soup
Mtops is a measure of computer performance used by the U.S. government to determine whether a computer can be exported to certain countries. What does Mtops stand for?
a. millions of technical operations per second
b. million theoretical operations per second
c. modulated technical operations per second
Answer

Learning Center Update: A primer on Exchange public folders
Learn how to make the most of public folders -- from setting permissions and storage limits to customizing, recovering and troubleshooting public folder content.

Additions and Updates

Do you use Google? You can find our definitions quickly on Google by just entering: Whatis.com name-of-term. For example, go to Google and enter "Whatis.com bit stuffing" (without the quotes) and you'll find a link to our definition for "bit stuffing."
(Hint: Go to Google right now and try it.)

serial-attached SCSI
smart antenna
SISO
AutoRun
Quiz: Memory



Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]



ABOUT THIS E-NEWSLETTER
TechTarget This e-newsletter is published by WhatIs.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
Copyright 2004 TechTarget. All rights reserved.

To unsubscribe from "Word of the Day":
Go to unsubscribe: http://WhatIs.techtarget.com/u?cid=497212&lid=430801&track=NL-34

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
WhatIs
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to