z-logo
Premium
7.6.3 Architecting a Secure Enterprise Data Sharing Environment to the Edge
Author(s) -
Farroha Bassam S.,
Farroha Deborah L.
Publication year - 2011
Publication title -
incose international symposium
Language(s) - English
Resource type - Journals
ISSN - 2334-5837
DOI - 10.1002/j.2334-5837.2011.tb01256.x
Subject(s) - enterprise information security architecture , computer security , computer science , doors , data sharing , domain (mathematical analysis) , architecture , enhanced data rates for gsm evolution , information sharing , world wide web , telecommunications , operating system , medicine , art , mathematical analysis , alternative medicine , mathematics , pathology , visual arts
1.0 ABSTRACT This paper analyzes secure data sharing outside the security domain. There is a high demand for accessing multiple levels of sensitive data at the edge; however the threat at that location is higher compared to the core enterprise environment. This paper investigates the requirements, technologies and risk mitigation techniques for securely sharing information with the tactical user while protecting the data and the information systems from intruders and malware. The new Enterprise Architecture needs to eliminate the stovepipe architectures and open the doors to share information across traditional and non‐traditional domain boundaries.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here