De-perimeterisation

De-perimeterisation

In information security, de-perimeterisation is a concept/strategy used to describe protecting an organization's systems and data on multiple levels by using a mixture of encryption, inherently-secure computer protocols, inherently-secure computer systems and data-level authentication rather than the reliance of an organization on its (network) boundary/perimeter to the Internet.

Successful implementation of a de-perimeterised strategy within an organization thus implies that the perimeter, or outer security boundary, could be removed.

Contents

Origin of the term

The de-perimeterisation term was initially devised by Jon Measham, a former employee of the UK’s Royal Mail in a 2001 research paper, and subsequently is a term used by the Jericho Forum of which the Royal Mail was a founding member.

Potential benefits

Claims made for removal of this border include the freeing up of business-to-business transactions, the reduction in cost and the ability for a company to be more agile. Taken to its furthest extent an organisation could operate securely directly on the Internet.

Operating without a hardened border frees organizations to collaborate, utilizing solutions based on a Collaboration Oriented Architecture framework.

Variations on the term

More recently the term is being used in the context of a result of both entropy and the deliberate activities of individuals within organizations to usurp perimeters often for well intentioned reasons. The latest Jericho Forum paper named Collaboration Oriented Architecture refers to the trend of De-Perimeterisation as a problem;

Problem
The traditional electronic boundary between a corporate (or ‘private’) network and the Internet is breaking down in the trend which we have called de-perimeterisation. [4]


Variations of the term have been used to describe aspects of de-perimeterisation such as;

  • "You’ve already been de-perimeterised" to describe the Internet worms and viruses which are designed to by-pass the border using web and e-mail [5].
  • "re-perimeterisation" to describe the interim step of moving perimeters to protection groups of computer servers or a data centre – rather than the perimeter.
  • "Macro-Perimeterisation" the act of moving the security perimeter into "the cloud", see Security As A Service, examples of such security services in the cloud are exemplified by email cleaning services or proxy filtering services provided by towers in the internet.
  • "micro-perimeterisation" moving the security perimeter to surround the data itself, interim steps might include moving the perimeter around individual computer systems or an individual application (consisting of a cluster of computers).

Spelling variations

The spelling preferred by the originators of the term, and the spelling preferred in locales that follow British usage, is de-perimeterisation, with a hyphen and an s. In locales that follow American usage, the term is often spelled with a z instead of an s: de-perimeterization.

The spelling without the hyphen is also seen (deperimeterization or deperimeterisation), but is considered incorrect by the term's originators, the Jericho Forum. (See: https://www.opengroup.org/jericho/faq-misc.htm)

References

  1. PITAC (Presidents Information Technology Advisory Committee) “Cyber Security: A Crisis of Prioritization” US Government February 2005 http://www.itrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf “Fundamentally New Security Models, Methods Needed: The vast majority of cyber security research conducted to date has been based on the concept of perimeter defense. This weakness of the perimeter defence strategy has become painfully clear.”
  2. Alan Lawson “A World without Boundaries” Butler Review Journal Article April 2005 http://www.butlergroup.com/research/DocView.asp?ID={BD1E4C70-F644-42F1-903E-CDBC09A38B8D} [Membership required to access document] “Deperimeterisation has become more than an interesting idea it is now a requirement for many organizations. Vendors have shown an increasing willingness to listen to the user community, but in the absence of a coherent voice from the end-users themselves, may have been uncertain about to whom they should be listening. As long as Jericho [Forum] can continue to build upon its foundations and successfully integrate vendor input into its ongoing strategies, then we see no reason why this community should not become a strong and valuable voice in the years ahead.”
  3. Paul Stamp, & Robert Whiteley with Laura Koetzle & Michael Rasmussen “Jericho Forum Looks To Bring Network Walls Tumbling Down” Forrester http://www.forrester.com/Research/Document/Excerpt/0,7211,37317,00.html [Chargeable document] “The Jericho Forum is turning current security models on their heads, and it’s likely to affect much more than the way companies look at orthodox IT security. Jericho’s approach touches on domains like digital rights management, network quality of service, and business partner risk management.”
  4. The Jericho Forum's Collaboration Oriented Architecture Paper Collaboration Oriented Architecture paper
  5. Joanne Cummings "Security in a world without borders" Network World 27 September 2004 http://www.networkworld.com/buzz/2004/092704perimeter.html "Face it, you've already been de-perimeterized. The question now is, what are you going to do about it?"

External links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Macro-Perimeterisation — is a concept related to the JerichoForum that involves devolving a part of the security of the Internet back to the Internet Service Providers (ISPs) and other network providers. It is one of the required activities involved in the concept of de… …   Wikipedia

  • Jericho Forum — The Jericho Forum is a group of organizations working together to define and promote the solutions surrounding the issue of De perimeterisation. It was officially founded at the offices of the Open Group in Reading, UK, on Friday 16th January… …   Wikipedia

  • Collaboration Oriented Architecture — This is a term used in the areas of information security, IT security, network security and computer security.Collaboration Oriented Architecture is a concept used to describe the design of a computer system that is designed to collaborate, or… …   Wikipedia

  • Collaboration-oriented architecture — is a concept used to describe the design of a computer system that is designed to collaborate, or use services, from systems that are outside of your locus of control. Collaboration Oriented Architecture will often utilize Service Oriented… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”