Deperimeterization/Related Articles

From Citizendium
Jump to navigation Jump to search
This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Deperimeterization.
See also changes related to Deperimeterization, or pages that link to Deperimeterization or to this page or whose text contains "Deperimeterization".

Parent topics

  • Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
  • Computer network [r]: A collection of computers or digital devices ("nodes") connected by communication links. [e]
  • Distributed computing [r]: A strategy for improving the speed of highly parallelizable tasks by distributing pieces of the problem across many computers that together form a distributed computing system, e.g. BOINC, SETI@home. [e]
    • Locality of networks [r]: The assumption, in networking technologies, about the characteristics of the user space they support, and, as importantly, the user spaces they should ignore [e]
    • Cloud computing [r]: Use of computer networks, especially the Internet, to access computer resources, operated by a third party; access is on-demand and dynamically assigned — cloud computing differs from managed hosting with resources dedicated to users [e]

Subtopics

Other related topics

  • Kerckhoffs' Principle [r]: The principle, formulated by Auguste Kerckhoffs, that security in a cipher should not depend on keeping the details of the cipher secret; it should depend only on keeping the key secret. [e]
  • Principle of Least Privilege [r]: A security principle that gives individuals only the special privileges needed to carry out a specific function; the default condition is that individuals do not have any privileges that were not explicitly granted. [e]