This Article 
 Bibliographic References 
 Add to: 
The State of Security
September/October 2005 (vol. 3 no. 5)
pp. 51-53
Peter Kuper, Morgan Stanley
The information security train has been running at 100 miles per hour for a few years now--unfortunately, though, we're going in reverse. The security market first focused on the perimeter, firewalls, and antivirus technologies, determined to keep the bad stuff from entering the infrastructure, only to then consider the network, with the logical sequence thus leading to protecting applications. However, the sole reason why information technology exists is to lever the critical asset--data. Security, as we define it, is data and network integrity--the protection of and access to the data. Ideally, security should have started with placing the protections as close to the asset as possible, not the opposite. Folks, we got it backwards.
Index Terms:
information security, security technology
Peter Kuper, "The State of Security," IEEE Security & Privacy, vol. 3, no. 5, pp. 51-53, Sept.-Oct. 2005, doi:10.1109/MSP.2005.134
Usage of this product signifies your acceptance of the Terms of Use.