Difference between revisions of "Security Boundary"

From MgmtWiki
Jump to: navigation, search
(Created page with "==Full Title or Meme== An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the p...")
 
(Full Title or Meme)
Line 1: Line 1:
 
==Full Title or Meme==
 
==Full Title or Meme==
An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product.<rev>NIST ''Glossary'' https://csrc.nist.gov/Glossary/?term=4819</ref>
+
An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product.<ref>NIST ''Glossary'' https://csrc.nist.gov/Glossary/?term=4819</ref>
 +
 
 
==Context==
 
==Context==
 
Since the very first [[Trusted Execution Environment]] in 1961 there has been the desire to place only a part of the [[Resource]]s of an enterprise in a location that is secure from attack.
 
Since the very first [[Trusted Execution Environment]] in 1961 there has been the desire to place only a part of the [[Resource]]s of an enterprise in a location that is secure from attack.

Revision as of 09:39, 25 July 2018

Full Title or Meme

An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product.[1]

Context

Since the very first Trusted Execution Environment in 1961 there has been the desire to place only a part of the Resources of an enterprise in a location that is secure from attack.

Problems

Solutions

References

  1. NIST Glossary https://csrc.nist.gov/Glossary/?term=4819