Monday, March 22, 2010

Perimeter security -- Pearly Gates

The goal of ultimate security is to keep unathorized or intruders outside of a secured area.  Security experts traditionally has focused on perimeter security such as gates, guards, video, firewalls, to prevent undesireable from getting in.

Since security has become more disperse and threats have changed in nature, the focus has become more than just the perimeter.

In todays environment the threat of a security breach is: equally likely from an external or internal source. Typically an internal breach will occur when some one's credentails or idenity is stolen. Organizations and associated facilities must prepare for unauthorize access with in the preimeter security.

To enforce security measures and protect consumers data, federal cybersecurity and senate Judiciary committee has imposed data security programs.  The new security model has evolved into a data centric security or focusing on the value of data and the potential fall out if the data is compromised.

To increase security, the focus becomes who and what process gets access to critical data. The level of protection correlates to quantified risk of breach. The goal of all orgizations is to properly secure sensative data and minimize risk of potential data breach. I will review various technologies that are being used to protect your data in cyberspace. Stay tuned...............

No comments: