Difference between revisions of "Security Boundary"
From MgmtWiki
								
												
				 (Created page with "==Full Title or Meme== An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the p...")  | 
				 (→Full Title or Meme)  | 
				||
| Line 1: | Line 1: | ||
==Full Title or Meme==  | ==Full Title or Meme==  | ||
| − | An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product.<  | + | An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product.<ref>NIST ''Glossary'' https://csrc.nist.gov/Glossary/?term=4819</ref>  | 
| + | |||
==Context==  | ==Context==  | ||
Since the very first [[Trusted Execution Environment]] in 1961 there has been the desire to place only a part of the [[Resource]]s of an enterprise in a location that is secure from attack.  | Since the very first [[Trusted Execution Environment]] in 1961 there has been the desire to place only a part of the [[Resource]]s of an enterprise in a location that is secure from attack.  | ||
Revision as of 09:39, 25 July 2018
Full Title or Meme
An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product.[1]
Context
Since the very first Trusted Execution Environment in 1961 there has been the desire to place only a part of the Resources of an enterprise in a location that is secure from attack.
Problems
Solutions
References
- ↑ NIST Glossary https://csrc.nist.gov/Glossary/?term=4819