
doi: 10.1109/msp.2005.134
The information security train has been running at 100 miles per hour for a few years now - unfortunately, though, we're going in reverse. The security market first focused on the perimeter, firewalls, and antivirus technologies, determined to keep the bad stuff from entering the infrastructure, only to then consider the network, with the logical sequence thus leading to protecting applications. However, the sole reason that information technology exists is to lever the critical asset - data. Security, as we define it, is data and network integrity - the protection of and access to the data. Ideally, security should have started with placing the protection as close to the assets (data) as possible, not the opposite; Folks, we got it backwards.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 7 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
