Matches in DBpedia 2016-04 for { <http://dbpedia.org/resource/Secure_end_node> ?p ?o }
Showing triples 1 to 34 of
34
with 100 triples per page.
- Secure_end_node abstract "A Secure End Node is a trusted, individual computer that temporarily becomes part of a trusted, sensitive, well-managed network and later connects to many other (un)trusted networks/clouds. SEN's cannot communicate good or evil data between the various networks (e.g. exfiltrate sensitive information, ingest malware, etc.). SENs often connect through an untrusted medium (e.g. the Internet) and thus require a secure connection and strong authentication (of the device, software, user, environment, etc.). The amount of trust required (and thus operational, physical, personnel, network, and system security applied) is commensurate with the risk of piracy, tampering, and reverse engineering (within a given threat environment). An essential characteristic of SENs is they cannot persist information as they change between networks (or domains).The remote, private, and secure network might be organization's in-house network or a cloud service. A Secure End Node typically involves authentication of (i.e. establishing trust in) the remote computer's hardware, firmware, software, and/or user. In the future, the device-user's environment (location, activity, other people, etc.) as communicated by means of its (or the network's) trusted sensors (camera, microphone, GPS, radio, etc.) could provide another factor of authentication.A Secure End Node solves/mitigates end node problem.The common, but expensive, technique to deploy SENs is for the network owner to issue known, trusted, unchangeable hardware to users. For example, and assuming apriori access, a laptop's TPM chip can authenticate the hardware (likewise a user's smartcard authenticates the user). A different example is the DoD Software Protection Initiative's Cross Fabric Internet Browsing System that provides browser-only, immutable, anti-tamper thin clients to users Internet browsing. Another example is a non-persistent, remote client that boots over the network.A less secure but very low cost approach is to trust any hardware (corporate, government, personal, or public) but restrict user and network access to a known kernel (computing) and higher software. An implementation of this is a Linux Live CD that creates a stateless, non-persistent client, for example Lightweight Portable Security. A similar system could boot a computer from a flashdrive or be an immutable operating system within a smartphone or tablet.".
- Secure_end_node wikiPageExternalLink spi.dod.mil.
- Secure_end_node wikiPageExternalLink CFIBS_DS_20100422.pdf.
- Secure_end_node wikiPageID "31350212".
- Secure_end_node wikiPageLength "3490".
- Secure_end_node wikiPageOutDegree "14".
- Secure_end_node wikiPageRevisionID "703079106".
- Secure_end_node wikiPageWikiLink Category:Computer_networking.
- Secure_end_node wikiPageWikiLink Client_(computing).
- Secure_end_node wikiPageWikiLink Cloud_computing.
- Secure_end_node wikiPageWikiLink End_node_problem.
- Secure_end_node wikiPageWikiLink Host_(network).
- Secure_end_node wikiPageWikiLink Kernel_(operating_system).
- Secure_end_node wikiPageWikiLink Lightweight_Portable_Security.
- Secure_end_node wikiPageWikiLink Linux.
- Secure_end_node wikiPageWikiLink Live_CD.
- Secure_end_node wikiPageWikiLink Node_(networking).
- Secure_end_node wikiPageWikiLink State_(computer_science).
- Secure_end_node wikiPageWikiLink Strong_authentication.
- Secure_end_node wikiPageWikiLink Trusted_Computing.
- Secure_end_node wikiPageWikiLink United_States_Department_of_Defense.
- Secure_end_node wikiPageWikiLinkText "Secure end node".
- Secure_end_node wikiPageWikiLinkText "secure end node".
- Secure_end_node wikiPageUsesTemplate Template:!.
- Secure_end_node wikiPageUsesTemplate Template:Other_uses.
- Secure_end_node wikiPageUsesTemplate Template:Reflist.
- Secure_end_node subject Category:Computer_networking.
- Secure_end_node comment "A Secure End Node is a trusted, individual computer that temporarily becomes part of a trusted, sensitive, well-managed network and later connects to many other (un)trusted networks/clouds. SEN's cannot communicate good or evil data between the various networks (e.g. exfiltrate sensitive information, ingest malware, etc.). SENs often connect through an untrusted medium (e.g.".
- Secure_end_node label "Secure end node".
- Secure_end_node sameAs Q17142420.
- Secure_end_node sameAs m.0gkxql1.
- Secure_end_node sameAs Q17142420.
- Secure_end_node wasDerivedFrom Secure_end_node?oldid=703079106.
- Secure_end_node isPrimaryTopicOf Secure_end_node.