-
Book Overview & Buying
-
Table Of Contents
Cyber Warfare – Truth, Tactics, and Strategies
By :
The perimeter-based security model is outdated and has unequivocally failed to secure businesses and enterprises across the planet. However, it is not because the basic concept of a secure edge is a failure. It is instead the proliferation of technology combined with the interconnected nature of current infrastructures that make this approach to security so ineffective. The very connectivity that is a boon for mankind, enabling business and everyday life, is its own worst enemy. A failure within one perimeter eventually will lead to a failure in many, and on and on it goes.
While the perimeter-based model of security has proven itself inefficient and a purveyor of failure, there are now issues far beyond those high walls that will afflict cyberspace for the coming decade. The time to understand what those items are and explore how they might be used for malevolent purposes is now, before they become problems that expand beyond the bounds of any control.
In the next chapter, we will move on from detailing the failures of perimeter-based security and discuss future issues that will affect security for governments and organizations. Also in this chapter, we will point out some of the new and more innovative attack types that will emerge in the near future.
Change the font size
Change margin width
Change background colour