Abstract. As we look at the cyber security ecosystem, are we planning to fight the battle in the same way we did yesterday, with firewalls and Intrusion Detection Systems (IDS), or are we sensing a change in how security is evolving and plan-ning accordingly? With the technology enablement and possi...
Other Authors: | |
---|---|
Format: | Text |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.2170 http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf |
id |
ftciteseerx:oai:CiteSeerX.psu:10.1.1.640.2170 |
---|---|
record_format |
openpolar |
spelling |
ftciteseerx:oai:CiteSeerX.psu:10.1.1.640.2170 2023-05-15T15:33:28+02:00 The Pennsylvania State University CiteSeerX Archives 2012 application/pdf http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.2170 http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf en eng http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.2170 http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf Metadata may be used without restrictions as long as the oai identifier remains attached to it. http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf text 2012 ftciteseerx 2016-01-08T15:55:33Z Abstract. As we look at the cyber security ecosystem, are we planning to fight the battle in the same way we did yesterday, with firewalls and Intrusion Detection Systems (IDS), or are we sensing a change in how security is evolving and plan-ning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered and organizations need a way to effectively manage this transition. Cyber in the Cloud During World War II, the Japanese took possession of U.S. soil only once. For a short period of time, they occupied the tiny islands of Attu and Kiska, off of the Alaskan coast [1, 2]. In response to this occupation, U.S. and Canadian forces fought hard and succeeded in reclaiming Attu, but not without heavy casualties. Coming off of this ordeal, these same forces stormed Kiska armed with the Text Attu Unknown Kiska ENVELOPE(155.830,155.830,50.258,50.258) |
institution |
Open Polar |
collection |
Unknown |
op_collection_id |
ftciteseerx |
language |
English |
description |
Abstract. As we look at the cyber security ecosystem, are we planning to fight the battle in the same way we did yesterday, with firewalls and Intrusion Detection Systems (IDS), or are we sensing a change in how security is evolving and plan-ning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered and organizations need a way to effectively manage this transition. Cyber in the Cloud During World War II, the Japanese took possession of U.S. soil only once. For a short period of time, they occupied the tiny islands of Attu and Kiska, off of the Alaskan coast [1, 2]. In response to this occupation, U.S. and Canadian forces fought hard and succeeded in reclaiming Attu, but not without heavy casualties. Coming off of this ordeal, these same forces stormed Kiska armed with the |
author2 |
The Pennsylvania State University CiteSeerX Archives |
format |
Text |
publishDate |
2012 |
url |
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.2170 http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf |
long_lat |
ENVELOPE(155.830,155.830,50.258,50.258) |
geographic |
Kiska |
geographic_facet |
Kiska |
genre |
Attu |
genre_facet |
Attu |
op_source |
http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf |
op_relation |
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.2170 http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf |
op_rights |
Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
_version_ |
1766364029376266240 |