Using the Private-Internet-Enterprise (PIE) Model to Examine IT Risks and Threats Due to Porous Perimeters

Autor: M. Scott Koger, Sandra J. Blanke, Christian Nielsen, Brett J. L. Landry
Rok vydání: 2009
Předmět:
Zdroj: Information Security Journal: A Global Perspective. 18:163-169
ISSN: 1939-3547
1939-3555
DOI: 10.1080/19393550903044112
Popis: There is a common misconception that internal IP networks (intranets) are secure and that only external networks such as the Internet and extranets are vulnerable and unsecured. The truth is that information on a network is not secure. With increases in network connectivity, the potential of bridging multiple networks on a single device, shared knowledge bases, and Web 2.0 integration of legacy applications, the problems are compounded. Traditional reliance on perimeter devices and security has proven to be ineffective in securing information in today's highly connected environments. This lack of security on increasingly powerful handheld devices, which tap into our information assets, will lead inevitably to increased exposure for our enterprise networks. The very nature of devices being networked makes them vulnerable on an IP network to various attacks and spoofs. This paper proposes a new model to identify and examine threats to information assets from private, Internet, and enterprise sources.
Databáze: OpenAIRE
Nepřihlášeným uživatelům se plný text nezobrazuje
Pro tento záznam nejsou dostupné žádné jednotky.