Click here to load reader
Jun 19, 2015
2. Introduction
3. PART I: Jericho versus Conventional Security 4. The Industrial Security Model
5. Examples Mechanism Perimeter Asset Policy Lock Box Whats in the box Who has the key Guard house Fence The site within the fence Who is on the security guards list Firewall Perimeterised computernetwork Information and applications attached to the network The packet filtering configurations on the firewall 6. Modern Business Trends
De-perimeterisation 7. Perimeterised Security hypothesis versus real world Users need to access assetsfrom anywhere Users mustenter the perimeterto access the assets. Processes are complexand unique Processes are simpleand repeatable Many different partieshave a stake in an information asset Single business ownersets the access policy for its assets Workers access an assetonce a minute The workers go into the factoryonce per day Mergers, de-mergers, joint ventures, shared services are the norm; legislationchanges constantly Rare Changes to the perimeter , the gate house or the employees Suppliers and customersneed access; employees constitute a potential threat Employeesare the good guys; everyone else must be kept out Access policies arerich and complex The gate house has asimple list of the people with access Assets outside the perimeterarent protected by a gatehouse on the perimeter Assets inside the perimeteris guarded by a gatehouse 8. Perimeter based security is outdated
9. Consequences of the Mismatch
10. PART 2: Collaboration Oriented Architecture 11. The Collaboration Oriented Architecture (COA)
Right level of security 12. The Collaboration Oriented Architecture (COA)
Change of paradigm 13. Trusted network Network Access Insiders theft Application vulnerabilities Compliance Residual risks Security Review Model.ppt PageFirewall Content filtering VPN Internet & Partners Perimeter style security IPS 14. End Point Protection Trust monitor Risk assessment Identity federation Encrypted data transmission Deperimeterized network PageService Protection Cloud Security Jericho Style Security 15. Collaborations
16. Trust
17. Reputation
18. The Trust Lifecycle Trust based security Security Activities 19. Identity
20. Examples