Coping with the Disappearance of Network Boundaries Peyton Engel, Berbee Click to start Table of Contents Coping with the Disappearance of Network Boundaries Agenda Why I'm (un)Qualified to Talk The Network Perimeter Attacks on Switches Where Does Our Stuff End? VPNs and Extruded Networks Now Let's Add WLANs In... Now Let's Add WLANs In... Now Let's Add WLANs In... Client-Server Interaction Side 1: The Server Side 1: The ServerTraditional Roles Side 2: The Client Side 2: The ClientTraditional Roles Client-Server Interaction: We Think in Terms of Isolation But really, it's not like that... Use an App to Attack Users HTML e-mail What do we get? "Infrastructure" vs. "Code" Multi-layer problems… The Big Picture Challenges to Security Efforts Security Strategies: How Can We Succeed? Inverted Security and ROI Architectural Concerns Other examples of Pulling Security Inwards The Ideal Situation Why might this work? Conclusions Questions?
Click to start