Abstract. As we look at the cyber security ecosystem, are we planning to fight the battle in the same way we did yesterday, with firewalls and Intrusion Detection Systems (IDS), or are we sensing a change in how security is evolving and plan-ning accordingly? With the technology enablement and possi...

Full description

Bibliographic Details
Other Authors: The Pennsylvania State University CiteSeerX Archives
Format: Text
Language:English
Published: 2012
Subjects:
Online Access:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.2170
http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf
id ftciteseerx:oai:CiteSeerX.psu:10.1.1.640.2170
record_format openpolar
spelling ftciteseerx:oai:CiteSeerX.psu:10.1.1.640.2170 2023-05-15T15:33:28+02:00 The Pennsylvania State University CiteSeerX Archives 2012 application/pdf http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.2170 http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf en eng http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.2170 http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf Metadata may be used without restrictions as long as the oai identifier remains attached to it. http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf text 2012 ftciteseerx 2016-01-08T15:55:33Z Abstract. As we look at the cyber security ecosystem, are we planning to fight the battle in the same way we did yesterday, with firewalls and Intrusion Detection Systems (IDS), or are we sensing a change in how security is evolving and plan-ning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered and organizations need a way to effectively manage this transition. Cyber in the Cloud During World War II, the Japanese took possession of U.S. soil only once. For a short period of time, they occupied the tiny islands of Attu and Kiska, off of the Alaskan coast [1, 2]. In response to this occupation, U.S. and Canadian forces fought hard and succeeded in reclaiming Attu, but not without heavy casualties. Coming off of this ordeal, these same forces stormed Kiska armed with the Text Attu Unknown Kiska ENVELOPE(155.830,155.830,50.258,50.258)
institution Open Polar
collection Unknown
op_collection_id ftciteseerx
language English
description Abstract. As we look at the cyber security ecosystem, are we planning to fight the battle in the same way we did yesterday, with firewalls and Intrusion Detection Systems (IDS), or are we sensing a change in how security is evolving and plan-ning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered and organizations need a way to effectively manage this transition. Cyber in the Cloud During World War II, the Japanese took possession of U.S. soil only once. For a short period of time, they occupied the tiny islands of Attu and Kiska, off of the Alaskan coast [1, 2]. In response to this occupation, U.S. and Canadian forces fought hard and succeeded in reclaiming Attu, but not without heavy casualties. Coming off of this ordeal, these same forces stormed Kiska armed with the
author2 The Pennsylvania State University CiteSeerX Archives
format Text
publishDate 2012
url http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.2170
http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf
long_lat ENVELOPE(155.830,155.830,50.258,50.258)
geographic Kiska
geographic_facet Kiska
genre Attu
genre_facet Attu
op_source http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf
op_relation http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.2170
http://www.crosstalkonline.org/storage/issue-archives/2012/201211/201211-Hiltbrand.pdf
op_rights Metadata may be used without restrictions as long as the oai identifier remains attached to it.
_version_ 1766364029376266240