LISA '03 - Invited Talk
Coping with the Disappearance of Network Boundaries
Peyton Engel,
Berbee
Click to start
Table of Contents
Coping with the Disappearance of Network Boundaries
Agenda
Why I'm (un)Qualified to Talk
The Network Perimeter
Attacks on Switches
Where Does Our Stuff End?
VPNs and Extruded Networks
Now Let's Add WLANs In...
Now Let's Add WLANs In...
Now Let's Add WLANs In...
Client-Server Interaction
Side 1: The Server
Side 1: The Server—Traditional Roles
Side 2: The Client
Side 2: The Client—Traditional Roles
Client-Server Interaction: We Think in Terms of Isolation
But really, it's not like that...
Use an App to Attack Users
HTML e-mail
What do we get?
"Infrastructure" vs. "Code"
Multi-layer problems…
The Big Picture
Challenges to Security Efforts
Security Strategies: How Can We Succeed?
Inverted Security and ROI
Architectural Concerns
Other examples of Pulling Security Inwards
The Ideal Situation
Why might this work?
Conclusions
Questions?
Need help?
Use our Contacts page.
Last changed: 27 Oct. 2003 aw
Technical Program
LISA '03 Home
USENIX home