First page Back Continue Last page Summary Graphic
Yesterdays Solutions Wont Work in Todays Systems
Open, highly distributed systems
Unknown perimeters
No central administrative control
No global visibility
Unknown components (COTS, Java, etc.)
Unknown participants
Untrusted insiders
Large-scale coordinated attacks