{"id":75,"date":"2013-04-08T11:31:56","date_gmt":"2013-04-08T16:31:56","guid":{"rendered":"https:\/\/www.softwareab.net\/wordpress\/?p=75"},"modified":"2013-05-01T13:49:55","modified_gmt":"2013-05-01T18:49:55","slug":"whitepaper-02-03-network-perimeter-security","status":"publish","type":"post","link":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/","title":{"rendered":"Whitepaper 02-03: Network Perimeter Security"},"content":{"rendered":"<p><a href=\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/Network-Perimeter-Security.pdf\">Download the whitepaper &#8220;Network Perimeter Security&#8221; here!<\/a><\/p>\n<p>Most small companies struggle with network security, but that does not relieve these companies of the requirements for ensuring the confidentiality, integrity, and availability of their network and network resources. This whitepaper helps small organizations address their network requirements, especially at the physical layout to include at least the following \u00e2\u20ac\u0153security zones:\u00e2\u20ac\u009d<!--more--><\/p>\n<ul>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\"><em>public<\/em> \u00e2\u20ac\u201c the organization\u00e2\u20ac\u2122s \u00e2\u20ac\u0153face\u00e2\u20ac\u009d to the world (reception via secure entry)<\/span><\/li>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\"><em>protected<\/em> \u00e2\u20ac\u201c the organization\u00e2\u20ac\u2122s proprietary information (locked access requiring entry codes or a key \u00e2\u20ac\u201c\u00c2\u00a0think a corporate safe)<\/span><\/li>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\"><em>internal<\/em> \u00e2\u20ac\u201c employee workspaces (bullpen \u00e2\u20ac\u201c normally an open or thinly partitioned area)<\/span><\/li>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\"><em>guest<\/em> \u00e2\u20ac\u201c provides an area for visitors to be entertained (think the \u00e2\u20ac\u0153nice\u00e2\u20ac\u009d executive conference room)<\/span><\/li>\n<\/ul>\n<p>Not coincidentally, many logical corporate networks are built to reflect and support that rather simplistic\u00c2\u00a0model. Adding to this simple network design is the fact that in most cases an organization will standardize on\u00c2\u00a0some single operating system (in this paper we\u00e2\u20ac\u2122ll assume the ubiquitous Windows environment, but of course it\u00c2\u00a0could be anything). Given these typical constraints and notional logical network setup, we look at some\u00c2\u00a0common effects on the organization\u00e2\u20ac\u2122s network security perimeter.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Download the whitepaper &#8220;Network Perimeter Security&#8221; here! Most small companies struggle with network security, but that does not relieve these companies of the requirements for ensuring the confidentiality, integrity, and availability of their network and network resources. This whitepaper helps &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"more-link\" href=\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/\"> <span class=\"screen-reader-text\">Whitepaper 02-03: Network Perimeter Security<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[16,13,14],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Whitepaper 02-03: Network Perimeter Security - softwareab<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Whitepaper 02-03: Network Perimeter Security - softwareab\" \/>\n<meta property=\"og:description\" content=\"Download the whitepaper &#8220;Network Perimeter Security&#8221; here! Most small companies struggle with network security, but that does not relieve these companies of the requirements for ensuring the confidentiality, integrity, and availability of their network and network resources. This whitepaper helps &hellip; Whitepaper 02-03: Network Perimeter Security Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/\" \/>\n<meta property=\"og:site_name\" content=\"softwareab\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cloudraticsolutions\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/cloudraticsolutions\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-08T16:31:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-05-01T18:49:55+00:00\" \/>\n<meta name=\"author\" content=\"Andrew Bruce\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@realcloudratics\" \/>\n<meta name=\"twitter:site\" content=\"@realcloudratics\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Bruce\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/\"},\"author\":{\"name\":\"Andrew Bruce\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\"},\"headline\":\"Whitepaper 02-03: Network Perimeter Security\",\"datePublished\":\"2013-04-08T16:31:56+00:00\",\"dateModified\":\"2013-05-01T18:49:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/\"},\"wordCount\":197,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\"},\"keywords\":[\"dod\",\"ia\",\"policy\"],\"articleSection\":[\"Teknophobia\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/\",\"name\":\"Whitepaper 02-03: Network Perimeter Security - softwareab\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#website\"},\"datePublished\":\"2013-04-08T16:31:56+00:00\",\"dateModified\":\"2013-05-01T18:49:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareab.net\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"dod\",\"item\":\"https:\/\/www.softwareab.net\/wordpress\/tag\/dod\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Whitepaper 02-03: Network Perimeter Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#website\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/\",\"name\":\"softwareab\",\"description\":\"Technocratica, Technopolitik, Technophobia\",\"publisher\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareab.net\/wordpress\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\",\"name\":\"Andrew Bruce\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg\",\"contentUrl\":\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg\",\"width\":400,\"height\":330,\"caption\":\"Andrew Bruce\"},\"logo\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/\"},\"description\":\"Team-oriented systems mentor with deep knowledge of numerous software methodologies, technologies, languages, and operating systems. Excited about turning emerging technology into working production-ready systems. Focused on moving software teams to a higher level of world-class application development. Specialties:Software analysis and development...Product management through the entire lifecycle...Discrete product integration specialist!\",\"sameAs\":[\"http:\/\/cloudraticsolutions.net\/\",\"https:\/\/www.facebook.com\/cloudraticsolutions\/\",\"https:\/\/twitter.com\/realcloudratics\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper 02-03: Network Perimeter Security - softwareab","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/","og_locale":"en_US","og_type":"article","og_title":"Whitepaper 02-03: Network Perimeter Security - softwareab","og_description":"Download the whitepaper &#8220;Network Perimeter Security&#8221; here! Most small companies struggle with network security, but that does not relieve these companies of the requirements for ensuring the confidentiality, integrity, and availability of their network and network resources. This whitepaper helps &hellip; Whitepaper 02-03: Network Perimeter Security Read More &raquo;","og_url":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/","og_site_name":"softwareab","article_publisher":"https:\/\/www.facebook.com\/cloudraticsolutions\/","article_author":"https:\/\/www.facebook.com\/cloudraticsolutions\/","article_published_time":"2013-04-08T16:31:56+00:00","article_modified_time":"2013-05-01T18:49:55+00:00","author":"Andrew Bruce","twitter_card":"summary_large_image","twitter_creator":"@realcloudratics","twitter_site":"@realcloudratics","twitter_misc":{"Written by":"Andrew Bruce","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/#article","isPartOf":{"@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/"},"author":{"name":"Andrew Bruce","@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600"},"headline":"Whitepaper 02-03: Network Perimeter Security","datePublished":"2013-04-08T16:31:56+00:00","dateModified":"2013-05-01T18:49:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/"},"wordCount":197,"commentCount":0,"publisher":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600"},"keywords":["dod","ia","policy"],"articleSection":["Teknophobia"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/","url":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/","name":"Whitepaper 02-03: Network Perimeter Security - softwareab","isPartOf":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#website"},"datePublished":"2013-04-08T16:31:56+00:00","dateModified":"2013-05-01T18:49:55+00:00","breadcrumb":{"@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-03-network-perimeter-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareab.net\/wordpress\/"},{"@type":"ListItem","position":2,"name":"dod","item":"https:\/\/www.softwareab.net\/wordpress\/tag\/dod\/"},{"@type":"ListItem","position":3,"name":"Whitepaper 02-03: Network Perimeter Security"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareab.net\/wordpress\/#website","url":"https:\/\/www.softwareab.net\/wordpress\/","name":"softwareab","description":"Technocratica, Technopolitik, Technophobia","publisher":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareab.net\/wordpress\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600","name":"Andrew Bruce","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg","contentUrl":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg","width":400,"height":330,"caption":"Andrew Bruce"},"logo":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/"},"description":"Team-oriented systems mentor with deep knowledge of numerous software methodologies, technologies, languages, and operating systems. Excited about turning emerging technology into working production-ready systems. Focused on moving software teams to a higher level of world-class application development. Specialties:Software analysis and development...Product management through the entire lifecycle...Discrete product integration specialist!","sameAs":["http:\/\/cloudraticsolutions.net\/","https:\/\/www.facebook.com\/cloudraticsolutions\/","https:\/\/twitter.com\/realcloudratics"]}]}},"_links":{"self":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts\/75"}],"collection":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/comments?post=75"}],"version-history":[{"count":3,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts\/75\/revisions"}],"predecessor-version":[{"id":220,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts\/75\/revisions\/220"}],"wp:attachment":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/media?parent=75"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/categories?post=75"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/tags?post=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}