DocumentCode :
40000
Title :
From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud
Author :
Amoroso, Edward G.
Volume :
11
Issue :
1
fYear :
2013
fDate :
Jan.-Feb. 2013
Firstpage :
23
Lastpage :
31
Abstract :
The enterprise perimeter has exhibited gradual trust degradation owing to a succession of connectivity decisions involving Web, email, virtual private networking, exceptions, and mobile networks as well as a succession of threats including malware and advanced persistent threats (APTs). The author proposes restoring trust to the enterprise by focusing protection strategies on a set of prioritized assets. The protections center on three zones: a client zone, a network zone with network-based carrier protection services, and a cloud zone with third-party attested security heavily indexed toward identity and access management services. The resultant enterprise network is more resilient to leakage attacks such as APTs.
Keywords :
Internet; client-server systems; cloud computing; computer network security; invasive software; mobile computing; trusted computing; virtual private networks; APT; access management services; advanced persistent threats; client zone; connectivity decision; email; enterprise network; enterprise perimeter; malware; mobile networks; mobility-enabled secure cloud; network zone; network-based carrier protection services; protection center; protection strategies; third-party attested security; trust degradation; virtual private networking; Cloud computing; Computer security; Malware; Mobile communication; Virtual private networks; advanced persistent threats; enterprise networks; enterprise perimeter; firewall; intrusion detection system; intrusion prevention system;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2013.8
Filename :
6427810
Link To Document :
بازگشت