Download Now Free registration required
IT perimeter security is a fairly broad term that has a diverse set of implications and meanings. It is quite common to misunderstand the nuances implied by the term. In the beginning of the digital computer age, computer systems were single stand-alone entities, tipsily located in a physically secured room known as the machine room. Input and output media were hand-carried into the room or handled at the Remote Job Entry (RJE) location. Both the machine room and the RJE were subject to the physical security and access controls in place at the given location. Because the computational center was located in well-defined locations, it was easy to identify sources of entry. Therefore: The perimeter was very well defined, and security could be enforced on a physical level.
- Format: PDF
- Size: 2566.4 KB