November 07, 2002
The Perimeter is Dead
Defending a perimeter or boundary of any type is expensive and often a poor allocation of resources. In the physical world it occasionally makes sense to defend a perimeter, in the digital world perimeter defense is a tough place to get a return on investments. Here are several examples and relevant bits of data...
1. The first goal of an external attacker is to obtain the privileges of an insider. Check out Honeynet.org for more.
2. Depending on which survey you examine (FBI/CSI, IDC, Gartner, Meta, etc�) roughly 70% of all major intrusions are committed by an insider. (See Computer Associate�s �Rose in Benefits� campaign.)
3. Lumeta, the network mapping company, estimates their average customer (think BIG corporations) knows where 70% of their network goes. If you don�t know where that other 30% is � how can you possibly defend it?
4. The big technology news in Panama this week comes from an attempt to block telephone calls that travel over the Internet instead of the traditional voice network (VoIP vs. POTS at C&W Panama) the slashdot bookies have 2:1 odds on VoIP) � check out the Politech post from Cisco.
5. As for #4 - digital music, IM chat over port 80, and wireless LANs everywhere simply prove that technology beats law in almost every case.Posted by Abner on November 7, 2002 03:56 PM | TrackBack