Deperimeterization changing today's security practices

Royal Holloway authors explain how basic deperimeterization principles can ensure that security does not suffer when traditional boundaries are eroded.

Every new technological development – from multi-Gigabyte USB sticks to cloud computing and virtualisation – puts an extra strain on security and creates new threats that need to be tackled.

Unlike the days when companies worked on closed networks and data remained in air-conditioned rooms, we now work in an environment that is increasingly open and mobile. This is the world that inspired the concept of "deperimeterization" and which will continue to provide security professionals with some of their biggest challenges.

But could this new open world still apply in a sector that needs to be absolutely secure, such as law enforcement?

This is the theme of a new article published on (see below for .pdf). Its two authors, Kwok Keong Lee and Peter Wild, have taken the principles developed by the  The article is part of our 2009 series featuring the best new MSc theses from graduates of the information security group at Royal Holloway University of London (RHUL).

The article focuses on deperimeterization, specifically on the problems created in law enforcement, but it illustrates amply how the basic Jericho principles can ensure that security does not suffer when traditional boundaries are eroded. The authors examine specific threats and come up with counter-measures; they also lay out a set of action guidelines for the short, medium and long term.

For anyone moving into a deperimeterized world, the articles provides original and detailed advice. Read How to help law enforcement live in a world without secure boundaries (.pdf) by Kwok Keong Lee and Peter Wild.

SearchSecurity's association with RHUL began last year when we published 12 articles from RHUL's MSc graduates. These were widely appreciated for their new ideas and relevance to security problems. We believe the 2009 series is equally wide-ranging and thought-provoking.

Read more on Hackers and cybercrime prevention