UBM: TECH DIGITAL RESOURCE LIBRARY

Secure Anchor Point

Dec 01, 2009

Download As the world computing infrastructure becomes likewise complicated, network and system communications have significant problems in identifying who to trust. Corporate and government personnel enter systems through a variety of methods: remote access, wireless PDAs, laptops via VPN from public access points. Establishing trust includes the identity of hardware and processor nodes, the identity and authenticity of software instructions, and the identity and authenticity of system users. Describing and categorizing all of the different types of friendly and unfriendly behavior in modern networks becomes overwhelming and cost prohibitive. One way to address the problem of trust in the electronic domain is the same way it is approached in the social world: relying on a handful of trusted sources to vouch for the authenticity of others, which can be called "secure anchor points." These can be official documents, badges, and personal references in the social world; the secure anchor point in a digital electronics system allows management and system administrators to validate the operational integrity of their networks and any persons who have access to their systems.


Whitepaper