About: Gateway and Security Stack   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Mobile devices, like almost all computing devices, have the capacity to be used to attack other networked devices. The unique dual-connected nature (cellular and wireless Ethernet) of mobile devices makes them ideal platforms for circumventing traditional network security boundary protections. To prevent damage to the enterprise from a compromised mobile device, access to the enterprise must be restricted through one or more known network routes (i.e., Gateways) and inspected by standard network defenses such as stateful packet inspection, intrusion detection, and application and protocol filters. These standard defenses are collectively known as a "filter stack" because they serve to filter unwanted network traffic and are usually configured in a "stack" with traffic traversing each filte

AttributesValues
rdfs:label
  • Gateway and Security Stack
rdfs:comment
  • Mobile devices, like almost all computing devices, have the capacity to be used to attack other networked devices. The unique dual-connected nature (cellular and wireless Ethernet) of mobile devices makes them ideal platforms for circumventing traditional network security boundary protections. To prevent damage to the enterprise from a compromised mobile device, access to the enterprise must be restricted through one or more known network routes (i.e., Gateways) and inspected by standard network defenses such as stateful packet inspection, intrusion detection, and application and protocol filters. These standard defenses are collectively known as a "filter stack" because they serve to filter unwanted network traffic and are usually configured in a "stack" with traffic traversing each filte
dcterms:subject
abstract
  • Mobile devices, like almost all computing devices, have the capacity to be used to attack other networked devices. The unique dual-connected nature (cellular and wireless Ethernet) of mobile devices makes them ideal platforms for circumventing traditional network security boundary protections. To prevent damage to the enterprise from a compromised mobile device, access to the enterprise must be restricted through one or more known network routes (i.e., Gateways) and inspected by standard network defenses such as stateful packet inspection, intrusion detection, and application and protocol filters. These standard defenses are collectively known as a "filter stack" because they serve to filter unwanted network traffic and are usually configured in a "stack" with traffic traversing each filter in sequence. The [Gateway and Security Stack] (GSS) typically functions at the session and below layers of the OSI network model.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software