From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud

@article{Amoroso2013FromTE,
  title={From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud},
  author={Edward Amoroso},
  journal={IEEE Security & Privacy},
  year={2013},
  volume={11},
  pages={23-31}
}
The enterprise perimeter has exhibited gradual trust degradation owing to a succession of connectivity decisions involving Web, email, virtual private networking, exceptions, and mobile networks as well as a succession of threats including malware and advanced persistent threats (APTs). The author proposes restoring trust to the enterprise by focusing protection strategies on a set of prioritized assets. The protections center on three zones: a client zone, a network zone with network-based… CONTINUE READING
8 Citations
4 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-4 of 4 references

The Anatomy of an Advanced Persistent Threat,

  • T. Cutler
  • SecurityWeek,
  • 2010

and S

  • W. Fenso
  • Hill, Implementing and Managing Telework: A Guide…
  • 2003

Secure Computer Systems, tech

  • D. E. Bell, L. J. LaPadula
  • report MTR-2547, Mitre, Mar.–Dec.
  • 1973

Similar Papers

Loading similar papers…