Deperimeterization/Related Articles
Jump to navigation
Jump to search
- See also changes related to Deperimeterization, or pages that link to Deperimeterization or to this page or whose text contains "Deperimeterization".
Parent topics
- Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Computer network [r]: A collection of computers or digital devices ("nodes") connected by communication links. [e]
- Distributed computing [r]: A strategy for improving the speed of highly parallelizable tasks by distributing pieces of the problem across many computers that together form a distributed computing system, e.g. BOINC, SETI@home. [e]
- Cloud computing [r]: Use of computer networks, especially the Internet, to access computer resources, operated by a third party; access is on-demand and dynamically assigned — cloud computing differs from managed hosting with resources dedicated to users [e]
Subtopics
- Open Group [r]: Add brief definition or description
- Endpoint security [r]: Add brief definition or description
- Kerckhoffs' Principle [r]: The principle, formulated by Auguste Kerckhoffs, that security in a cipher should not depend on keeping the details of the cipher secret; it should depend only on keeping the key secret. [e]
- Principle of Least Privilege [r]: A security principle that gives individuals only the special privileges needed to carry out a specific function; the default condition is that individuals do not have any privileges that were not explicitly granted. [e]