3. Security
"...The weakness of the usual perimeter defense model, generally used by companies, has become painfully obvious..."
February 2005 PITAC report to the President of the United States (Cyber Security, a crisis of Prioritization). https://www.nitrd.gov/cybersecurity/PITACReport2005.pdf
The perimeter defense usually employed by companies consists in protecting the inside of a computer system against an attacker from the outside. The disadvantages are numerous:
once the barrier has been breached (software vulnerability, operator error, etc.), the attacker can compromise all systems with little more effort than compromising one;
...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Security
Article included in this offer
"Software technologies and System architectures"
(
227 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources