Using the Private-Internet-Enterprise (PIE) Model to Examine IT Risks and Threats Due to Porous Perimeters
Autor: | M. Scott Koger, Sandra J. Blanke, Christian Nielsen, Brett J. L. Landry |
---|---|
Rok vydání: | 2009 |
Předmět: |
Intranet
Information Systems and Management business.industry Computer science Internet privacy Enterprise information security architecture Information security Internet security Asset (computer security) Computer security computer.software_genre Security information and event management Computer Science Applications Information security management The Internet business computer Software |
Zdroj: | Information Security Journal: A Global Perspective. 18:163-169 |
ISSN: | 1939-3547 1939-3555 |
DOI: | 10.1080/19393550903044112 |
Popis: | There is a common misconception that internal IP networks (intranets) are secure and that only external networks such as the Internet and extranets are vulnerable and unsecured. The truth is that information on a network is not secure. With increases in network connectivity, the potential of bridging multiple networks on a single device, shared knowledge bases, and Web 2.0 integration of legacy applications, the problems are compounded. Traditional reliance on perimeter devices and security has proven to be ineffective in securing information in today's highly connected environments. This lack of security on increasingly powerful handheld devices, which tap into our information assets, will lead inevitably to increased exposure for our enterprise networks. The very nature of devices being networked makes them vulnerable on an IP network to various attacks and spoofs. This paper proposes a new model to identify and examine threats to information assets from private, Internet, and enterprise sources. |
Databáze: | OpenAIRE |
Externí odkaz: | |
Nepřihlášeným uživatelům se plný text nezobrazuje | K zobrazení výsledku je třeba se přihlásit. |
Pro tento záznam nejsou dostupné žádné jednotky.