Abstract. As we look at the cyber security ecosystem, are we planning to fight the battle in the same way we did yesterday, with firewalls and Intrusion Detection Systems (IDS), or are we sensing a change in how security is evolving and plan-ning accordingly? With the technology enablement and possi...
Other Authors: | |
---|---|
Format: | Text |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.2170 http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf |
Summary: | Abstract. As we look at the cyber security ecosystem, are we planning to fight the battle in the same way we did yesterday, with firewalls and Intrusion Detection Systems (IDS), or are we sensing a change in how security is evolving and plan-ning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered and organizations need a way to effectively manage this transition. Cyber in the Cloud During World War II, the Japanese took possession of U.S. soil only once. For a short period of time, they occupied the tiny islands of Attu and Kiska, off of the Alaskan coast [1, 2]. In response to this occupation, U.S. and Canadian forces fought hard and succeeded in reclaiming Attu, but not without heavy casualties. Coming off of this ordeal, these same forces stormed Kiska armed with the |
---|