ABSTRACT

Introduction For all practical purposes, every information system is being hosted by the Internet, and its security state is, at best, that of the Internet itself. An information system can increase its security by getting out of the Internet, but that may nil its functionality. Therefore, while numerous security measures can be applied onto an individual information system, its overall security is a function of the cybersecurity. The physical aspect of cyberspace, the Internet, is a collection of networks that individually faithfully pass packets to each other, but collectively bear no intelligence that can recognize an individual or a distributed threat. Consequently, “Enterprise to Enterprise security [is] at risk without a global integrated security architecture [1].”