Issue No.01 - Jan.-Feb. (2013 vol.11)
Edward G. Amoroso , AT&T Labs
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2013.8
The enterprise perimeter has exhibited gradual trust degradation owing to a succession of connectivity decisions involving Web, email, virtual private networking, exceptions, and mobile networks as well as a succession of threats including malware and advanced persistent threats (APTs). The author proposes restoring trust to the enterprise by focusing protection strategies on a set of prioritized assets. The protections center on three zones: a client zone, a network zone with network-based carrier protection services, and a cloud zone with third-party attested security heavily indexed toward identity and access management services. The resultant enterprise network is more resilient to leakage attacks such as APTs.
Cloud computing, Computer security, Malware, Mobile communication, Virtual private networks, advanced persistent threats, enterprise perimeter, enterprise networks, firewall, intrusion detection system, intrusion prevention system
Edward G. Amoroso, "From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud", IEEE Security & Privacy, vol.11, no. 1, pp. 23-31, Jan.-Feb. 2013, doi:10.1109/MSP.2013.8