DocumentCode :
1031449
Title :
Security Boundaries
Author :
Farrell, Stephen
Author_Institution :
Trinity Coll. Dublin, Dublin
Volume :
12
Issue :
1
fYear :
2008
Firstpage :
93
Lastpage :
96
Abstract :
Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data crosses each boundary. In this inaugural column on practical security, boundaries from smaller to larger are discussed and a couple of vulnerabilities are described. A potential path forward to tackling such issues based on the idea of a system´s attack surface.
Keywords :
Internet; security of data; Internet; Control systems; Data mining; Data security; Educational institutions; Information security; Internet; Transport protocols; Universal Serial Bus; Virtual manufacturing; Voice mail; Web 2.0; enterprise network boundaries; host virtualization; middleboxes; practical security; security boundaries;
fLanguage :
English
Journal_Title :
Internet Computing, IEEE
Publisher :
ieee
ISSN :
1089-7801
Type :
jour
DOI :
10.1109/MIC.2008.19
Filename :
4428345
Link To Document :
بازگشت