Chapter 6 Security Reference Model
Chapter 6 Security Reference Model
Sandeep Bhowmik
Chapter 6
• Many other factors are also related with the issue of security.
• Data Boundary
• Internal (I)
• External (E)
• Data Boundary
• Ownership
• Proprietary (P)
• Open (O)
• Ownership
• Security Boundary
• Perimeterised (Per)
• De-perimeterised (D-p)
• Sourcing
• Insourced
• Outsourced
• Sourcing
• Sourcing
• Hence the eight smaller cubes that come out after combining the
first three dimensions discussed, can take either of the two
colours.
Thank You