Royal Holloway eBook Seri

Deperimeterization changing today's security practices

Every new technological development – from multi-Gigabyte USB sticks to cloud computing and virtualisation – puts an extra strain on security and creates new threats that need to be tackled.

Requires Free Membership to View

Unlike the days when companies worked on closed networks and data remained in air-conditioned rooms, we now work in an environment that is increasingly open and mobile. This is the world that inspired the concept of "deperimeterization" and which will continue to provide security professionals with some of their biggest challenges.

But could this new open world still apply in a sector that needs to be absolutely secure, such as law enforcement?

This is the theme of a new article published on SearchSecurity.co.uk (see below for .pdf). Its two authors, Kwok Keong Lee and Peter Wild, have taken the principles developed by the  The article is part of our 2009 series featuring the best new MSc theses from graduates of the information security group at Royal Holloway University of London (RHUL).

The article focuses on deperimeterization, specifically on the problems created in law enforcement, but it illustrates amply how the basic Jericho principles can ensure that security does not suffer when traditional boundaries are eroded. The authors examine specific threats and come up with counter-measures; they also lay out a set of action guidelines for the short, medium and long term.

For anyone moving into a deperimeterized world, the articles provides original and detailed advice. Read How to help law enforcement live in a world without secure boundaries (.pdf) by Kwok Keong Lee and Peter Wild.

SearchSecurity's association with RHUL began last year when we published 12 articles from RHUL's MSc graduates. These were widely appreciated for their new ideas and relevance to security problems. We believe the 2009 series is equally wide-ranging and thought-provoking.


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in June 2009

 

COMMENTS powered by Disqus  //  Commenting policy