Title
Security posture for civilian and non-civilian networks.
Abstract
Network security is dependent upon securing individual components, services, and applications. This is done through the prevention, detection, and correction of threats and attacks that exploit vulnerabilities in the network. Network security must be analyzed using various factors, such as security requirements, the inherent strengths and vulnerabilities of different network technologies, and the processes used to design, deploy, and operate networks. The Bell Laboratories security model provides the framework required to plan, design, and assess the end-to-end security of networks. In this paper, the Bell Labs security model is used to (1) define the basic security needs of civilian and non-civilian networks, (2) examine the security capabilities of various technologies and identify their security strengths and gaps, (3) identify key threat-mitigation strategies for civilian and non-civilian networks, and (4) illustrate the value of a comprehensive framework (e.g., the Bell Labs model) in any security program, whether designed for a civilian or a non-civilian network. (C) 2004 Lucent Technologies Inc.
Year
DOI
Venue
2004
10.1002/bltj.10095
Bell Labs Technical Journal
Field
DocType
Volume
Security convergence,Security testing,Network security policy,Security through obscurity,Computer security,Computer network,Security service,Cloud computing security,Engineering,Security information and event management,Computer security model
Journal
8
Issue
ISSN
Citations 
4
1089-7089
0
PageRank 
References 
Authors
0.34
1
5
Name
Order
Citations
PageRank
S. Rao Vasireddy1215.83
Steven Wolter200.34
Uma Chandrashekhar3388.97
Robert J. Thornberry Jr.431.69
Andrew R. Mcgee5347.39