Matches in DBpedia 2014 for { <http://dbpedia.org/resource/End_node_problem> ?p ?o. }
Showing items 1 to 15 of
15
with 100 items per page.
- End_node_problem abstract "The end node problem arises when individual computers are used for sensitive work and/or temporarily become part of a trusted, well-managed network/cloud and then are used for more risky activities and/or join untrusted networks. (Individual computers on the periphery of networks/clouds are called end nodes.) End nodes often are not managed to the trusted network‘s high computer security standards[citation needed]. End nodes often have weak/outdated software, weak security tools, excessive permissions, mis-configurations, questionable content and apps, and covert exploitations[citation needed]. Cross contamination and unauthorized release of data from within a computer system becomes the problem.Within the vast cyber-ecosystem, these end nodes often attach transiently to one or more clouds/networks, some trustworthy and others not. A few examples: a corporate desktop browsing the Internet, a corporate laptop checking company webmail via a coffee shop's open Wi-Fi access point, a personal computer used to telecommute during the day and gaming at night, or app within a smartphone/tablet (or any of the previous use/device combinations). Even if fully updated and tightly locked down, these nodes may ferry malware from one network (e.g. a corrupted webpage or an infected email message) into another, sensitive network. Likewise, the end nodes may exfiltrate sensitive data (e.g. log keystrokes or screen-capture). Assuming the device is fully trustworthy, the end node must provide the means to properly authenticate the user. Other nodes may impersonate trusted computers, thus requiring device authentication. The device and user may be trusted but within an untrustworthy environment (as determined by inboard sensors' feedback). Collectively, these risks are called the End Node Problem. There are several remedies but all require instilling trust in the end node and conveying that trust to the network/cloud.".
- End_node_problem wikiPageExternalLink SEN_SKG_DS_20081024.pdf.
- End_node_problem wikiPageExternalLink Best_Practices_Datasheets.pdf.
- End_node_problem wikiPageID "26086817".
- End_node_problem wikiPageRevisionID "589536402".
- End_node_problem hasPhotoCollection End_node_problem.
- End_node_problem subject Category:Computer_network_security.
- End_node_problem subject Category:Operating_system_security.
- End_node_problem comment "The end node problem arises when individual computers are used for sensitive work and/or temporarily become part of a trusted, well-managed network/cloud and then are used for more risky activities and/or join untrusted networks. (Individual computers on the periphery of networks/clouds are called end nodes.) End nodes often are not managed to the trusted network‘s high computer security standards[citation needed].".
- End_node_problem label "End node problem".
- End_node_problem sameAs m.0b6glr1.
- End_node_problem sameAs Q5375822.
- End_node_problem sameAs Q5375822.
- End_node_problem wasDerivedFrom End_node_problem?oldid=589536402.
- End_node_problem isPrimaryTopicOf End_node_problem.